Labour Day Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Master the Check Point Certified Security Expert R81.20 156-315.81 Exam with Confidence!

Questions 181

Vanessa is expecting a very important Security Report. The Document should be sent as an attachment via e-mail. An e-mail with Security_report.pdf file was delivered to her e-mail inbox. When she opened the PDF file, she noticed that the file is basically empty and only few lines of text are in it. The report is missing some graphs, tables and links.

Which component of SandBlast protection is her company using on a Gateway?

Options:

A.

SandBlast Threat Emulation

B.

SandBlast Agent

C.

Check Point Protect

D.

SandBlast Threat Extraction

Buy Now
Questions 182

Fill in the blank: __________ information is included in “Full Log” tracking option, but is not included in “Log” tracking option?

Options:

A.

Destination port

B.

Data type

C.

File attributes

D.

Application

Buy Now
Questions 183

The log server sends what to the Correlation Unit?

Options:

A.

Authentication requests

B.

CPMI dbsync

C.

Logs

D.

Event Policy

Buy Now
Questions 184

What is the correct Syntax for adding an access-rule via R80 API?

Options:

A.

add access-rule layer "Network" action "Allow"

B.

add access-rule layer "Network" position 1 name "Rule 1" service. 1 "SMTP" service.2 "hup"

C.

add access-rule and follow the wizard

D.

add rule position 1 name "Rule 1" policy-package "Standard" add service "http"

Buy Now
Questions 185

What command is used to manually failover a cluster during a zero-downtime upgrade?

Options:

A.

set cluster member down

B.

cpstop

C.

clusterXL_admin down

D.

set clusterXL down

Buy Now