Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Checkpoint 156-315.81 Practice Exam with Questions & Answers | Set: 7

Questions 91

The following command is used to verify the CPUSE version:

Options:
A.

HostName:0>show installer status build

B.

[Expert@HostName:0]#show installer status

C.

[Expert@HostName:0]#show installer status build

D.

HostName:0>show installer build

Checkpoint 156-315.81 Premium Access
Questions 92

What is the purpose of extended master key extension/session hash?

Options:
A.

UDP VOIP protocol extension

B.

In case of TLS1.x it is a prevention of a Man-in-the-Middle attack/disclosure of the client-server communication

C.

Special TCP handshaking extension

D.

Supplement DLP data watermark

Questions 93

What is the difference between SSL VPN and IPSec VPN?

Options:
A.

IPSec VPN does not require installation of a resilient VPN client.

B.

SSL VPN requires installation of a resident VPN client.

C.

SSL VPN and IPSec VPN are the same.

D.

IPSec VPN requires installation of a resident VPN client and SSL VPN requires only an installed Browser.

Questions 94

To accelerate the rate of connection establishment, SecureXL groups all connection that match a particular service and whose sole differentiating element is the source port. The type of grouping enables even the very first packets of a TCP handshake to be accelerated. The first packets of the first connection on the same service will be forwarded to the Firewall kernel which will then create a template of the connection. Which of the these is NOT a SecureXL template?

Options:
A.

Accept Template

B.

Deny Template

C.

Drop Template

D.

NAT Template

Questions 95

When simulating a problem on ClusterXL cluster with cphaprob –d STOP -s problem -t 0 register, to initiate a failover on an active cluster member, what command allows you remove the problematic state?

Options:
A.

cphaprob –d STOP unregister

B.

cphaprob STOP unregister

C.

cphaprob unregister STOP

D.

cphaprob –d unregister STOP

Questions 96

Which web services protocol is used to communicate to the Check Point R81 Identity Awareness Web API?

Options:
A.

SOAP

B.

REST

C.

XLANG

D.

XML-RPC

Questions 97

When Dynamic Dispatcher is enabled, connections are assigned dynamically with the exception of:

Options:
A.

Threat Emulation

B.

HTTPS

C.

QOS

D.

VoIP

Questions 98

Customer’s R81 management server needs to be upgraded to R81.20. What is the best upgrade method when the management server is not connected to the Internet?

Options:
A.

Export R81 configuration, clean install R81.20 and import the configuration

B.

CPUSE offline upgrade

C.

CPUSE online upgrade

D.

SmartUpdate upgrade

Questions 99

What processes does CPM control?

Options:
A.

Object-Store, Database changes, CPM Process and web-services

B.

web-services, CPMI process, DLEserver, CPM process

C.

DLEServer, Object-Store, CP Process and database changes

D.

web_services, dle_server and object_Store

Questions 100

Which Remote Access Client does not provide an Office-Mode Address?

Options:
A.

SecuRemote

B.

Endpoint Security Suite

C.

Endpoint Security VPN

D.

Check Point Mobile

Questions 101

SecureXL improves non-encrypted firewall traffic throughput and encrypted VPN traffic throughput.

Options:
A.

This statement is true because SecureXL does improve all traffic.

B.

This statement is false because SecureXL does not improve this traffic but CoreXL does.

C.

This statement is true because SecureXL does improve this traffic.

D.

This statement is false because encrypted traffic cannot be inspected.

Questions 102

What API command below creates a new host with the name “New Host” and IP address of “192.168.0.10”?

Options:
A.

new host name “New Host” ip-address “192.168.0.10”

B.

set host name “New Host” ip-address “192.168.0.10”

C.

create host name “New Host” ip-address “192.168.0.10”

D.

add host name “New Host” ip-address “192.168.0.10”

Questions 103

What is the benefit of “tw monitor” over “tcpdump”?

Options:
A.

“fw monitor” reveals Layer 2 information, while “tcpdump” acts at Layer 3.

B.

“fw monitor” is also available for 64-Bit operating systems.

C.

With “fw monitor”, you can see the inspection points, which cannot be seen in “tcpdump”

D.

“fw monitor” can be used from the CLI of the Management Server to collect information from multiple gateways.

Questions 104

Which configuration file contains the structure of the Security Server showing the port numbers, corresponding protocol name, and status?

Options:
A.

$FWDIR/database/fwauthd.conf

B.

$FWDIR/conf/fwauth.conf

C.

$FWDIR/conf/fwauthd.conf

D.

$FWDIR/state/fwauthd.conf

Questions 105

Under which file is the proxy arp configuration stored?

Options:
A.

$FWDIR/state/proxy_arp.conf on the management server

B.

$FWDIR/conf/local.arp on the management server

C.

$FWDIR/state/_tmp/proxy.arp on the security gateway

D.

$FWDIR/conf/local.arp on the gateway