Pass the Checkpoint CCSE R81 156-315.81 Questions and answers with CertsForce

Viewing page 11 out of 13 pages
Viewing questions 151-165 out of questions
Questions # 151:

What is the benefit of “tw monitor” over “tcpdump”?

Options:

A.

“fw monitor” reveals Layer 2 information, while “tcpdump” acts at Layer 3.


B.

“fw monitor” is also available for 64-Bit operating systems.


C.

With “fw monitor”, you can see the inspection points, which cannot be seen in “tcpdump”


D.

“fw monitor” can be used from the CLI of the Management Server to collect information from multiple gateways.


Expert Solution
Questions # 152:

Security Checkup Summary can be easily conducted within:

Options:

A.

Summary


B.

Views


C.

Reports


D.

Checkups


Expert Solution
Questions # 153:

What scenario indicates that SecureXL is enabled?

Options:

A.

Dynamic objects are available in the Object Explorer


B.

SecureXL can be disabled in cpconfig


C.

fwaccel commands can be used in clish


D.

Only one packet in a stream is seen in a fw monitor packet capture


Expert Solution
Questions # 154:

NO: 180

What command can you use to have cpinfo display all installed hotfixes?

Options:

A.

cpinfo -hf


B.

cpinfo –y all


C.

cpinfo –get hf


D.

cpinfo installed_jumbo


Expert Solution
Questions # 155:

What is considered Hybrid Emulation Mode?

Options:

A.

Manual configuration of file types on emulation location.


B.

Load sharing of emulation between an on premise appliance and the cloud.


C.

Load sharing between OS behavior and CPU Level emulation.


D.

High availability between the local SandBlast appliance and the cloud.


Expert Solution
Questions # 156:

How would you deploy TE250X Check Point appliance just for email traffic and in-line mode without a Check Point Security Gateway?

Options:

A.

Install appliance TE250X on SpanPort on LAN switch in MTA mode.


B.

Install appliance TE250X in standalone mode and setup MTA.


C.

You can utilize only Check Point Cloud Services for this scenario.


D.

It is not possible, always Check Point SGW is needed to forward emails to SandBlast appliance.


Expert Solution
Questions # 157:

Automation and Orchestration differ in that:

Options:

A.

Automation relates to codifying tasks, whereas orchestration relates to codifying processes.


B.

Automation involves the process of coordinating an exchange of information through web service interactions such as XML and JSON, but orchestration does not involve processes.


C.

Orchestration is concerned with executing a single task, whereas automation takes a series of tasks and puts them all together into a process workflow.


D.

Orchestration relates to codifying tasks, whereas automation relates to codifying processes.


Expert Solution
Questions # 158:

When installing a dedicated R81 SmartEvent server. What is the recommended size of the root partition?

Options:

A.

Any size


B.

Less than 20GB


C.

More than 10GB and less than 20GB


D.

At least 20GB


Expert Solution
Questions # 159:

What is a best practice before starting to troubleshoot using the “fw monitor” tool?

Options:

A.

Run the command: fw monitor debug on


B.

Clear the connections table


C.

Disable CoreXL


D.

Disable SecureXL


Expert Solution
Questions # 160:

What is the purpose of Priority Delta in VRRP?

Options:

A.

When a box up, Effective Priority = Priority + Priority Delta


B.

When an Interface is up, Effective Priority = Priority + Priority Delta


C.

When an Interface fail, Effective Priority = Priority – Priority Delta


D.

When a box fail, Effective Priority = Priority – Priority Delta


Expert Solution
Questions # 161:

SecureXL improves non-encrypted firewall traffic throughput and encrypted VPN traffic throughput.

Options:

A.

This statement is true because SecureXL does improve all traffic.


B.

This statement is false because SecureXL does not improve this traffic but CoreXL does.


C.

This statement is true because SecureXL does improve this traffic.


D.

This statement is false because encrypted traffic cannot be inspected.


Expert Solution
Questions # 162:

What is the most recommended way to install patches and hotfixes?

Options:

A.

CPUSE Check Point Update Service Engine


B.

rpm -Uv


C.

Software Update Service


D.

UnixinstallScript


Expert Solution
Questions # 163:

With Mobile Access enabled, administrators select the web-based and native applications that can be accessed by remote users and define the actions that users can perform the applications. Mobile Access encrypts all traffic using:

Options:

A.

HTTPS for web-based applications and 3DES or RC4 algorithm for native applications. For end users to access the native applications, they need to install the SSL Network Extender.


B.

HTTPS for web-based applications and AES or RSA algorithm for native applications. For end users to access the native application, they need to install the SSL Network Extender.


C.

HTTPS for web-based applications and 3DES or RC4 algorithm for native applications. For end users to access the native applications, no additional software is required.


D.

HTTPS for web-based applications and AES or RSA algorithm for native applications. For end users to access the native application, no additional software is required.


Expert Solution
Questions # 164:

To add a file to the Threat Prevention Whitelist, what two items are needed?

Options:

A.

File name and Gateway


B.

Object Name and MD5 signature


C.

MD5 signature and Gateway


D.

IP address of Management Server and Gateway


Expert Solution
Questions # 165:

You find one of your cluster gateways showing “Down” when you run the “cphaprob stat” command. You then run the “clusterXL_admin up” on the down member but unfortunately the member continues to show down. What command do you run to determine the cause?

Options:

A.

cphaprob –f register


B.

cphaprob –d –s report


C.

cpstat –f all


D.

cphaprob –a list


Expert Solution
Viewing page 11 out of 13 pages
Viewing questions 151-165 out of questions