Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Checkpoint 156-315.81 Practice Exam with Questions & Answers | Set: 9

Questions 121

When gathering information about a gateway using CPINFO, what information is included or excluded when using the “-x” parameter?

Options:
A.

Includes the registry

B.

Gets information about the specified Virtual System

C.

Does not resolve network addresses

D.

Output excludes connection table

Checkpoint 156-315.81 Premium Access
Questions 122

Which statements below are CORRECT regarding Threat Prevention profiles in Smart Dashboard?

Options:
A.

You can assign only one profile per gateway and a profile can be assigned to one rule Only.

B.

You can assign multiple profiles per gateway and a profile can be assigned to one rule only.

C.

You can assign multiple profiles per gateway and a profile can be assigned to one or more rules.

D.

You can assign only one profile per gateway and a profile can be assigned to one or more rules.

Questions 123

Using Threat Emulation technologies, what is the best way to block .exe and .bat file types?

Options:
A.

enable DLP and select.exe and .bat file type

B.

enable .exe & .bat protection in IPS Policy

C.

create FW rule for particular protocol

D.

tecli advanced attributes set prohibited_file_types exe.bat

Questions 124

You need to see which hotfixes are installed on your gateway, which command would you use?

Options:
A.

cpinfo –h all

B.

cpinfo –o hotfix

C.

cpinfo –l hotfix

D.

cpinfo –y all

Questions 125

Can multiple administrators connect to a Security Management Server at the same time?

Options:
A.

No, only one can be connected

B.

Yes, all administrators can modify a network object at the same time

C.

Yes, every administrator has their own username, and works in a session that is independent of other administrators.

D.

Yes, but only one has the right to write.

Questions 126

Using ClusterXL, what statement is true about the Sticky Decision Function?

Options:
A.

Can only be changed for Load Sharing implementations

B.

All connections are processed and synchronized by the pivot

C.

Is configured using cpconfig

D.

Is only relevant when using SecureXL

Questions 127

What is the most recommended way to install patches and hotfixes?

Options:
A.

CPUSE Check Point Update Service Engine

B.

rpm -Uv

C.

Software Update Service

D.

UnixinstallScript

Questions 128

What scenario indicates that SecureXL is enabled?

Options:
A.

Dynamic objects are available in the Object Explorer

B.

SecureXL can be disabled in cpconfig

C.

fwaccel commands can be used in clish

D.

Only one packet in a stream is seen in a fw monitor packet capture

Questions 129

Which two of these Check Point Protocols are used by SmartEvent Processes?

Options:
A.

ELA and CPD

B.

FWD and LEA

C.

FWD and CPLOG

D.

ELA and CPLOG

Questions 130

Your manager asked you to check the status of SecureXL, and its enabled templates and features. What command will you use to provide such information to manager?

Options:
A.

fw accel stat

B.

fwaccel stat

C.

fw acces stats

D.

fwaccel stats

Questions 131

When requiring certificates for mobile devices, make sure the authentication method is set to one of the following, Username and Password, RADIUS or ________.

Options:
A.

SecureID

B.

SecurID

C.

Complexity

D.

TacAcs

Questions 132

Which of the following is a new R81 Gateway feature that had not been available in R77.X and older?

Options:
A.

The rule base can be built of layers, each containing a set of the security rules. Layers are inspected in the order in which they are defined, allowing control over the rule base flow and which security functionalities take precedence.

B.

Limits the upload and download throughput for streaming media in the company to 1 Gbps.

C.

Time object to a rule to make the rule active only during specified times.

D.

Sub Policies ae sets of rules that can be created and attached to specific rules. If the rule is matched, inspection will continue in the sub policy attached to it rather than in the next rule.

Questions 133

Fill in the blank: The R81 feature _____ permits blocking specific IP addresses for a specified time period.

Options:
A.

Block Port Overflow

B.

Local Interface Spoofing

C.

Suspicious Activity Monitoring

D.

Adaptive Threat Prevention

Questions 134

Fill in the blank: The R81 utility fw monitor is used to troubleshoot ______________________.

Options:
A.

User data base corruption

B.

LDAP conflicts

C.

Traffic issues

D.

Phase two key negotiations

Questions 135

Fill in the blank: The command ___________________ provides the most complete restoration of a R81 configuration.

Options:
A.

upgrade_import

B.

cpconfig

C.

fwm dbimport -p

D.

cpinfo –recover