Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Checkpoint 156-315.81 Practice Exam with Questions & Answers | Set: 8

Questions 106

You are investigating issues with to gateway cluster members are not able to establish the first initial cluster synchronization. What service is used by the FWD daemon to do a Full Synchronization?

Options:
A.

TCP port 443

B.

TCP port 257

C.

TCP port 256

D.

UDP port 8116

Checkpoint 156-315.81 Premium Access
Questions 107

SandBlast has several functional components that work together to ensure that attacks are prevented in real-time. Which the following is NOT part of the SandBlast component?

Options:
A.

Threat Emulation

B.

Mobile Access

C.

Mail Transfer Agent

D.

Threat Cloud

Questions 108

Which Check Point software blades could be enforced under Threat Prevention profile using Check Point R81.20 SmartConsole application?

Options:
A.

IPS, Anti-Bot, URL Filtering, Application Control, Threat Emulation.

B.

Firewall, IPS, Threat Emulation, Application Control.

C.

IPS, Anti-Bot, Anti-Virus, Threat Emulation, Threat Extraction.

D.

Firewall, IPS, Anti-Bot, Anti-Virus, Threat Emulation.

Questions 109

Which one of the following is true about Threat Emulation?

Options:
A.

Takes less than a second to complete

B.

Works on MS Office and PDF files only

C.

Always delivers a file

D.

Takes minutes to complete (less than 3 minutes)

Questions 110

SmartConsole R81 requires the following ports to be open for SmartEvent R81 management:

Options:
A.

19090,22

B.

19190,22

C.

18190,80

D.

19009,443

Questions 111

What are the main stages of a policy installations?

Options:
A.

Verification & Compilation, Transfer and Commit

B.

Verification & Compilation, Transfer and Installation

C.

Verification, Commit, Installation

D.

Verification, Compilation & Transfer, Installation

Questions 112

Which of the following describes how Threat Extraction functions?

Options:
A.

Detect threats and provides a detailed report of discovered threats.

B.

Proactively detects threats.

C.

Delivers file with original content.

D.

Delivers PDF versions of original files with active content removed.

Questions 113

What is the protocol and port used for Health Check and State Synchronization in ClusterXL?

Options:
A.

CCP and 18190

B.

CCP and 257

C.

CCP and 8116

D.

CPC and 8116

Questions 114

SandBlast offers flexibility in implementation based on their individual business needs. What is an option for deployment of Check Point SandBlast Zero-Day Protection?

Options:
A.

Smart Cloud Services

B.

Load Sharing Mode Services

C.

Threat Agent Solution

D.

Public Cloud Services

Questions 115

What is the purpose of a SmartEvent Correlation Unit?

Options:
A.

The SmartEvent Correlation Unit is designed to check the connection reliability from SmartConsole to the SmartEvent Server.

B.

The SmartEvent Correlation Unit’s task it to assign severity levels to the identified events.

C.

The Correlation unit role is to evaluate logs from the log server component to identify patterns/threats and convert them to events.

D.

The SmartEvent Correlation Unit is designed to check the availability of the SmartReporter Server.

Questions 116

Which Check Point daemon monitors the other daemons?

Options:
A.

fwm

B.

cpd

C.

cpwd

D.

fwssd

Questions 117

In the Check Point Firewall Kernel Module, each Kernel is associated with a key, which specifies the type of traffic applicable to the chain module. For Wire Mode configuration, chain modules marked with ____________ will not apply.

Options:
A.

ffff

B.

1

C.

2

D.

3

Questions 118

SmartEvent has several components that function together to track security threats. What is the function of the Correlation Unit as a component of this architecture?

Options:
A.

Analyzes each log entry as it arrives at the log server according to the Event Policy. When a threat pattern is identified, an event is forwarded to the SmartEvent Server.

B.

Correlates all the identified threats with the consolidation policy.

C.

Collects syslog data from third party devices and saves them to the database.

D.

Connects with the SmartEvent Client when generating threat reports.

Questions 119

John is using Management HA. Which Smartcenter should be connected to for making changes?

Options:
A.

secondary Smartcenter

B.

active Smartenter

C.

connect virtual IP of Smartcenter HA

D.

primary Smartcenter

Questions 120

Where do you create and modify the Mobile Access policy in R81?

Options:
A.

SmartConsole

B.

SmartMonitor

C.

SmartEndpoint

D.

SmartDashboard