Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Checkpoint 156-315.81 Practice Exam with Questions & Answers | Set: 11

Questions 151

You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each profile defines a(n) _____ or _____ action for the file types.

Options:
A.

Inspect/Bypass

B.

Inspect/Prevent

C.

Prevent/Bypass

D.

Detect/Bypass

Checkpoint 156-315.81 Premium Access
Questions 152

Which TCP-port does CPM process listen to?

Options:
A.

18191

B.

18190

C.

8983

D.

19009

Questions 153

What is true about the IPS-Blade?

Options:
A.

In R81, IPS is managed by the Threat Prevention Policy

B.

In R81, in the IPS Layer, the only three possible actions are Basic, Optimized and Strict

C.

In R81, IPS Exceptions cannot be attached to “all rules”

D.

In R81, the GeoPolicy Exceptions and the Threat Prevention Exceptions are the same

Questions 154

Where you can see and search records of action done by R81 SmartConsole administrators?

Options:
A.

In SmartView Tracker, open active log

B.

In the Logs & Monitor view, select “Open Audit Log View”

C.

In SmartAuditLog View

D.

In Smartlog, all logs

Questions 155

During inspection of your Threat Prevention logs you find four different computers having one event each with a Critical Severity. Which of those hosts should you try to remediate first?

Options:
A.

Host having a Critical event found by Threat Emulation

B.

Host having a Critical event found by IPS

C.

Host having a Critical event found by Antivirus

D.

Host having a Critical event found by Anti-Bot

Questions 156

To fully enable Dynamic Dispatcher with Firewall Priority Queues on a Security Gateway, run the following command in Expert mode then reboot:

Options:
A.

fw ctl multik set_mode 1

B.

fw ctl Dynamic_Priority_Queue on

C.

fw ctl Dynamic_Priority_Queue enable

D.

fw ctl multik set_mode 9

Questions 157

Which of the following authentication methods ARE NOT used for Mobile Access?

Options:
A.

RADIUS server

B.

Username and password (internal, LDAP)

C.

SecurID

D.

TACACS+

Questions 158

What is the least amount of CPU cores required to enable CoreXL?

Options:
A.

2

B.

1

C.

4

D.

6

Questions 159

SSL Network Extender (SNX) is a thin SSL VPN on-demand client that is installed on the remote user’s machine via the web browser. What are the two modes of SNX?

Options:
A.

Application and Client Service

B.

Network and Application

C.

Network and Layers

D.

Virtual Adapter and Mobile App

Questions 160

Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.

Options:
A.

Symmetric routing

B.

Failovers

C.

Asymmetric routing

D.

Anti-Spoofing

Questions 161

Which view is NOT a valid CPVIEW view?

Options:
A.

IDA

B.

RAD

C.

PDP

D.

VPN

Questions 162

To fully enable Dynamic Dispatcher on a Security Gateway:

Options:
A.

run fw ctl multik set_mode 9 in Expert mode and then Reboot.

B.

Using cpconfig, update the Dynamic Dispatcher value to “full” under the CoreXL menu.

C.

Edit/proc/interrupts to include multik set_mode 1 at the bottom of the file, save, and reboot.

D.

run fw multik set_mode 1 in Expert mode and then reboot.

Questions 163

Which command is used to set the CCP protocol to Multicast?

Options:
A.

cphaprob set_ccp multicast

B.

cphaconf set_ccp multicast

C.

cphaconf set_ccp no_broadcast

D.

cphaprob set_ccp no_broadcast

Questions 164

fwssd is a child process of which of the following Check Point daemons?

Options:
A.

fwd

B.

cpwd

C.

fwm

D.

cpd

Questions 165

In R81 spoofing is defined as a method of:

Options:
A.

Disguising an illegal IP address behind an authorized IP address through Port Address Translation.

B.

Hiding your firewall from unauthorized users.

C.

Detecting people using false or wrong authentication logins

D.

Making packets appear as if they come from an authorized IP address.