Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Checkpoint 156-315.81 Practice Exam with Questions & Answers | Set: 6

Questions 76

Which of the following is NOT an option to calculate the traffic direction?

Options:
A.

Incoming

B.

Internal

C.

External

D.

Outgoing

Checkpoint 156-315.81 Premium Access
Questions 77

Which statement is most correct regarding about “CoreXL Dynamic Dispatcher”?

Options:
A.

The CoreXL FW instanxces assignment mechanism is based on Source MAC addresses, Destination MAC addresses

B.

The CoreXL FW instances assignment mechanism is based on the utilization of CPU cores

C.

The CoreXL FW instances assignment mechanism is based on IP Protocol type

D.

The CoreXl FW instances assignment mechanism is based on Source IP addresses, Destination IP addresses, and the IP ‘Protocol’ type

Questions 78

In what way is Secure Network Distributor (SND) a relevant feature of the Security Gateway?

Options:
A.

SND is a feature to accelerate multiple SSL VPN connections

B.

SND is an alternative to IPSec Main Mode, using only 3 packets

C.

SND is used to distribute packets among Firewall instances

D.

SND is a feature of fw monitor to capture accelerated packets

Questions 79

When attempting to start a VPN tunnel, in the logs the error “no proposal chosen” is seen numerous times. No other VPN-related entries are present.

Which phase of the VPN negotiations has failed?

Options:
A.

IKE Phase 1

B.

IPSEC Phase 2

C.

IPSEC Phase 1

D.

IKE Phase 2

Questions 80

When SecureXL is enabled, all packets should be accelerated, except packets that match the following conditions:

Options:
A.

All UDP packets

B.

All IPv6 Traffic

C.

All packets that match a rule whose source or destination is the Outside Corporate Network

D.

CIFS packets

Questions 81

To ensure that VMAC mode is enabled, which CLI command should you run on all cluster members?

Options:
A.

fw ctl set int fwha vmac global param enabled

B.

fw ctl get int vmac global param enabled; result of command should return value 1

C.

cphaprob-a if

D.

fw ctl get int fwha_vmac_global_param_enabled; result of command should return value 1

Questions 82

With Mobile Access enabled, administrators select the web-based and native applications that can be accessed by remote users and define the actions that users can perform the applications. Mobile Access encrypts all traffic using:

Options:
A.

HTTPS for web-based applications and 3DES or RC4 algorithm for native applications. For end users to access the native applications, they need to install the SSL Network Extender.

B.

HTTPS for web-based applications and AES or RSA algorithm for native applications. For end users to access the native application, they need to install the SSL Network Extender.

C.

HTTPS for web-based applications and 3DES or RC4 algorithm for native applications. For end users to access the native applications, no additional software is required.

D.

HTTPS for web-based applications and AES or RSA algorithm for native applications. For end users to access the native application, no additional software is required.

Questions 83

Which of the following links will take you to the SmartView web application?

Options:
A.

https:// /smartviewweb/

B.

https:// /smartview/

C.

https:// smartviewweb

D.

https:// /smartview

Questions 84

How would you deploy TE250X Check Point appliance just for email traffic and in-line mode without a Check Point Security Gateway?

Options:
A.

Install appliance TE250X on SpanPort on LAN switch in MTA mode.

B.

Install appliance TE250X in standalone mode and setup MTA.

C.

You can utilize only Check Point Cloud Services for this scenario.

D.

It is not possible, always Check Point SGW is needed to forward emails to SandBlast appliance.

Questions 85

When an encrypted packet is decrypted, where does this happen?

Options:
A.

Security policy

B.

Inbound chain

C.

Outbound chain

D.

Decryption is not supported

Questions 86

As a valid Mobile Access Method, what feature provides Capsule Connect/VPN?

Options:
A.

That is used to deploy the mobile device as a generator of one-time passwords for authenticating to an RSA Authentication Manager.

B.

Fill Layer4 VPN –SSL VPN that gives users network access to all mobile applications.

C.

Full Layer3 VPN –IPSec VPN that gives users network access to all mobile applications.

D.

You can make sure that documents are sent to the intended recipients only.

Questions 87

Which command gives us a perspective of the number of kernel tables?

Options:
A.

fw tab -t

B.

fw tab -s

C.

fw tab -n

D.

fw tab -k

Questions 88

Which statement is true about ClusterXL?

Options:
A.

Supports Dynamic Routing (Unicast and Multicast)

B.

Supports Dynamic Routing (Unicast Only)

C.

Supports Dynamic Routing (Multicast Only)

D.

Does not support Dynamic Routing

Questions 89

Which command shows detailed information about VPN tunnels?

Options:
A.

cat $FWDIR/conf/vpn.conf

B.

vpn tu tlist

C.

vpn tu

D.

cpview

Questions 90

For Management High Availability, which of the following is NOT a valid synchronization status?

Options:
A.

Collision

B.

Down

C.

Lagging

D.

Never been synchronized