Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Checkpoint 156-315.81 Practice Exam with Questions & Answers | Set: 5

Questions 61

With SecureXL enabled, accelerated packets will pass through the following:

Options:
A.

Network Interface Card, OSI Network Layer, OS IP Stack, and the Acceleration Device

B.

Network Interface Card, Check Point Firewall Kernal, and the Acceleration Device

C.

Network Interface Card and the Acceleration Device

D.

Network Interface Card, OSI Network Layer, and the Acceleration Device

Checkpoint 156-315.81 Premium Access
Questions 62

What is the Implicit Clean-up Rule?

Options:
A.

A setting is defined in the Global Properties for all policies.

B.

A setting that is configured per Policy Layer.

C.

Another name for the Clean-up Rule.

D.

Automatically created when the Clean-up Rule is defined.

Questions 63

During the Check Point Stateful Inspection Process, for packets that do not pass Firewall Kernel Inspection and are rejected by the rule definition, packets are:

Options:
A.

Dropped without sending a negative acknowledgment

B.

Dropped without logs and without sending a negative acknowledgment

C.

Dropped with negative acknowledgment

D.

Dropped with logs and without sending a negative acknowledgment

Questions 64

What command would show the API server status?

Options:
A.

cpm status

B.

api restart

C.

api status

D.

show api status

Questions 65

What key is used to save the current CPView page in a filename format cpview_”cpview process ID”.cap”number of captures”?

Options:
A.

S

B.

W

C.

C

D.

Space bar

Questions 66

You need to change the number of firewall Instances used by CoreXL. How can you achieve this goal?

Options:
A.

edit fwaffinity.conf; reboot required

B.

cpconfig; reboot required

C.

edit fwaffinity.conf; reboot not required

D.

cpconfig; reboot not required

Questions 67

NO: 219

What cloud-based SandBlast Mobile application is used to register new devices and users?

Options:
A.

Check Point Protect Application

B.

Management Dashboard

C.

Behavior Risk Engine

D.

Check Point Gateway

Questions 68

Fill in the blank: The “fw monitor” tool can be best used to troubleshoot ____________________.

Options:
A.

AV issues

B.

VPN errors

C.

Network traffic issues

D.

Authentication issues

Questions 69

Which tool provides a list of trusted files to the administrator so they can specify to the Threat Prevention blade that these files do not need to be scanned or analyzed?

Options:
A.

ThreatWiki

B.

Whitelist Files

C.

AppWiki

D.

IPS Protections

Questions 70

How many policy layers do Access Control policy support?

Options:
A.

2

B.

4

C.

1

D.

3

Questions 71

What is the recommended number of physical network interfaces in a Mobile Access cluster deployment?

Options:
A.

4 Interfaces – an interface leading to the organization, a second interface leading to the internet, a third interface for synchronization, a fourth interface leading to the Security Management Server.

B.

3 Interfaces – an interface leading to the organization, a second interface leading to the Internet, a third interface for synchronization.

C.

1 Interface – an interface leading to the organization and the Internet, and configure for synchronization.

D.

2 Interfaces – a data interface leading to the organization and the Internet, a second interface for synchronization.

Questions 72

The SmartEvent R81 Web application for real-time event monitoring is called:

Options:
A.

SmartView Monitor

B.

SmartEventWeb

C.

There is no Web application for SmartEvent

D.

SmartView

Questions 73

The system administrator of a company is trying to find out why acceleration is not working for the traffic. The traffic is allowed according to the rule base and checked for viruses. But it is not accelerated.

What is the most likely reason that the traffic is not accelerated?

Options:
A.

There is a virus found. Traffic is still allowed but not accelerated.

B.

The connection required a Security server.

C.

Acceleration is not enabled.

D.

The traffic is originating from the gateway itself.

Questions 74

In which formats can Threat Emulation forensics reports be viewed in?

Options:
A.

TXT, XML and CSV

B.

PDF and TXT

C.

PDF, HTML, and XML

D.

PDF and HTML

Questions 75

One of major features in R81 SmartConsole is concurrent administration.

Which of the following is NOT possible considering that AdminA, AdminB and AdminC are editing the same Security Policy?

Options:
A.

A lock icon shows that a rule or an object is locked and will be available.

B.

AdminA and AdminB are editing the same rule at the same time.

C.

A lock icon next to a rule informs that any Administrator is working on this particular rule.

D.

AdminA, AdminB and AdminC are editing three different rules at the same time.