Labour Day Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Master the Check Point Certified Security Expert R81.20 156-315.81 Exam with Confidence!

Questions 91

Which Check Point software blades could be enforced under Threat Prevention profile using Check Point R81.20 SmartConsole application?

Options:

A.

IPS, Anti-Bot, URL Filtering, Application Control, Threat Emulation.

B.

Firewall, IPS, Threat Emulation, Application Control.

C.

IPS, Anti-Bot, Anti-Virus, Threat Emulation, Threat Extraction.

D.

Firewall, IPS, Anti-Bot, Anti-Virus, Threat Emulation.

Buy Now
Questions 92

Using Threat Emulation technologies, what is the best way to block .exe and .bat file types?

Options:

A.

enable DLP and select.exe and .bat file type

B.

enable .exe & .bat protection in IPS Policy

C.

create FW rule for particular protocol

D.

tecli advanced attributes set prohibited_file_types exe.bat

Buy Now
Questions 93

When setting up an externally managed log server, what is one item that will not be configured on the R81 Security Management Server?

Options:

A.

IP

B.

SIC

C.

NAT

D.

FQDN

Buy Now
Questions 94

What information is NOT collected from a Security Gateway in a Cpinfo?

Options:

A.

Firewall logs

B.

Configuration and database files

C.

System message logs

D.

OS and network statistics

Buy Now
Questions 95

Traffic from source 192.168.1.1 is going to www.google.com. The Application Control Blade on the gateway is inspecting the traffic. Assuming acceleration is enabled which path is handling the traffic?

Options:

A.

Slow Path

B.

Medium Path

C.

Fast Path

D.

Accelerated Path

Buy Now
Questions 96

Using mgmt_cli, what is the correct syntax to import a host object called Server_1 from the CLI?

Options:

A.

mgmt_cli add-host “Server_1” ip_address “10.15.123.10” --format txt

B.

mgmt_cli add host name “Server_1” ip-address “10.15.123.10” --format json

C.

mgmt_cli add object-host “Server_1” ip-address “10.15.123.10” --format json

D.

mgmt._cli add object “Server-1” ip-address “10.15.123.10” --format json

Buy Now
Questions 97

You are investigating issues with to gateway cluster members are not able to establish the first initial cluster synchronization. What service is used by the FWD daemon to do a Full Synchronization?

Options:

A.

TCP port 443

B.

TCP port 257

C.

TCP port 256

D.

UDP port 8116

Buy Now
Questions 98

When deploying SandBlast, how would a Threat Emulation appliance benefit from the integration of ThreatCloud?

Options:

A.

ThreatCloud is a database-related application which is located on-premise to preserve privacy of company-related data

B.

ThreatCloud is a collaboration platform for all the CheckPoint customers to form a virtual cloud consisting of a combination of all on-premise private cloud environments

C.

ThreatCloud is a collaboration platform for Check Point customers to benefit from VMWare ESXi infrastructure which supports the Threat Emulation Appliances as virtual machines in the EMC Cloud

D.

ThreatCloud is a collaboration platform for all the Check Point customers to share information about malicious and benign files that all of the customers can benefit from as it makes emulation of known files unnecessary

Buy Now
Questions 99

Which tool is used to enable ClusterXL?

Options:

A.

SmartUpdate

B.

cpconfig

C.

SmartConsole

D.

sysconfig

Buy Now
Questions 100

You have a Gateway is running with 2 cores. You plan to add a second gateway to build a cluster and used a device with 4 cores.

How many cores can be used in a Cluster for Firewall-kernel on the new device?

Options:

A.

3

B.

2

C.

1

D.

4

Buy Now
Questions 101

Which blades and or features are not supported in R81?

Options:

A.

SmartEvent Maps

B.

SmartEvent

C.

Identity Awareness

D.

SmartConsole Toolbars

Buy Now
Questions 102

What statement best describes the Proxy ARP feature for Manual NAT in R81.20?

Options:

A.

Automatic proxy ARP configuration can be enabled

B.

Translate Destination on Client Side should be configured

C.

fw ctl proxy should be configured

D.

local.arp file must always be configured

Buy Now
Questions 103

What key is used to save the current CPView page in a filename format cpview_”cpview process ID”.cap”number of captures”?

Options:

A.

S

B.

W

C.

C

D.

Space bar

Buy Now
Questions 104

SandBlast agent extends 0 day prevention to what part of the network?

Options:

A.

Web Browsers and user devices

B.

DMZ server

C.

Cloud

D.

Email servers

Buy Now
Questions 105

Fill in the blank: Browser-based Authentication sends users to a web page to acquire identities using ________ .

Options:

A.

User Directory

B.

Captive Portal and Transparent Kerberos Authentication

C.

Captive Portal

D.

UserCheck

Buy Now