Pass the Checkpoint CCSE R81 156-315.81 Questions and answers with CertsForce

Viewing page 1 out of 13 pages
Viewing questions 1-15 out of questions
Questions # 1:

On R81.20 when configuring Third-Party devices to read the logs using the LEA (Log Export API) the default Log Server uses port:

Options:

A.

18210


B.

18184


C.

257


D.

18191


Expert Solution
Questions # 2:

Fill in the blank: The R81 feature _____ permits blocking specific IP addresses for a specified time period.

Options:

A.

Block Port Overflow


B.

Local Interface Spoofing


C.

Suspicious Activity Monitoring


D.

Adaptive Threat Prevention


Expert Solution
Questions # 3:

Which command collects diagnostic data for analyzing customer setup remotely?

Options:

A.

cpinfo


B.

migrate export


C.

sysinfo


D.

cpview


Expert Solution
Questions # 4:

Which features are only supported with R81.20 Gateways but not R77.x?

Options:

A.

Access Control policy unifies the Firewall, Application Control & URL Filtering, Data Awareness, and Mobile Access Software Blade policies.


B.

Limits the upload and download throughput for streaming media in the company to 1 Gbps.


C.

The rule base can be built of layers, each containing a set of the security rules. Layers are inspected in the order in which they are defined, allowing control over the rule base flow and which security functionalities take precedence.


D.

Time object to a rule to make the rule active only during specified times.


Expert Solution
Questions # 5:

Advanced Security Checkups can be easily conducted within:

Options:

A.

Reports


B.

Advanced


C.

Checkups


D.

Views


E.

Summary


Expert Solution
Questions # 6:

Fill in the blank: The command ___________________ provides the most complete restoration of a R81 configuration.

Options:

A.

upgrade_import


B.

cpconfig


C.

fwm dbimport -p


D.

cpinfo –recover


Expert Solution
Questions # 7:

To fully enable Dynamic Dispatcher on a Security Gateway:

Options:

A.

run fw ctl multik set_mode 9 in Expert mode and then Reboot.


B.

Using cpconfig, update the Dynamic Dispatcher value to “full” under the CoreXL menu.


C.

Edit/proc/interrupts to include multik set_mode 1 at the bottom of the file, save, and reboot.


D.

run fw multik set_mode 1 in Expert mode and then reboot.


Expert Solution
Questions # 8:

What is not a component of Check Point SandBlast?

Options:

A.

Threat Emulation


B.

Threat Simulator


C.

Threat Extraction


D.

Threat Cloud


Expert Solution
Questions # 9:

Which CLI command will reset the IPS pattern matcher statistics?

Options:

A.

ips reset pmstat


B.

ips pstats reset


C.

ips pmstats refresh


D.

ips pmstats reset


Expert Solution
Questions # 10:

What is true about VRRP implementations?

Options:

A.

VRRP membership is enabled in cpconfig


B.

VRRP can be used together with ClusterXL, but with degraded performance


C.

You cannot have a standalone deployment


D.

You cannot have different VRIDs in the same physical network


Expert Solution
Questions # 11:

NAT rules are prioritized in which order?

1. Automatic Static NAT

2. Automatic Hide NAT

3. Manual/Pre-Automatic NAT

4. Post-Automatic/Manual NAT rules

Options:

A.

1, 2, 3, 4


B.

1, 4, 2, 3


C.

3, 1, 2, 4


D.

4, 3, 1, 2


Expert Solution
Questions # 12:

What is the mechanism behind Threat Extraction?

Options:

A.

This a new mechanism which extracts malicious files from a document to use it as a counter-attack against its sender.


B.

This is a new mechanism which is able to collect malicious files out of any kind of file types to destroy it prior to sending it to the intended recipient.


C.

This is a new mechanism to identify the IP address of the sender of malicious codes and put it into the SAM database (Suspicious Activity Monitoring).


D.

Any active contents of a document, such as JavaScripts, macros and links will be removed from the document and forwarded to the intended recipient, which makes this solution very fast.


Expert Solution
Questions # 13:

Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidates management console. CPM allows the GUI client and management server to communicate via web services using ___________.

Options:

A.

TCP port 19009


B.

TCP Port 18190


C.

TCP Port 18191


D.

TCP Port 18209


Expert Solution
Questions # 14:

What is the difference between an event and a log?

Options:

A.

Events are generated at gateway according to Event Policy


B.

A log entry becomes an event when it matches any rule defined in Event Policy


C.

Events are collected with SmartWorkflow form Trouble Ticket systems


D.

Log and Events are synonyms


Expert Solution
Questions # 15:

When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?

Options:

A.

None, Security Management Server would be installed by itself.


B.

SmartConsole


C.

SecureClient


D.

Security Gateway


E.

SmartEvent


Expert Solution
Viewing page 1 out of 13 pages
Viewing questions 1-15 out of questions