Pass the Checkpoint CCSE R81 156-315.81 Questions and answers with CertsForce

Viewing page 3 out of 13 pages
Viewing questions 31-45 out of questions
Questions # 31:

You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each profile defines a(n) _____ or _____ action for the file types.

Options:

A.

Inspect/Bypass


B.

Inspect/Prevent


C.

Prevent/Bypass


D.

Detect/Bypass


Expert Solution
Questions # 32:

What is the correct command to observe the Sync traffic in a VRRP environment?

Options:

A.

fw monitor –e “accept[12:4,b]=224.0.0.18;”


B.

fw monitor –e “accept port(6118;”


C.

fw monitor –e “accept proto=mcVRRP;”


D.

fw monitor –e “accept dst=224.0.0.18;”


Expert Solution
Questions # 33:

In R81, how do you manage your Mobile Access Policy?

Options:

A.

Through the Unified Policy


B.

Through the Mobile Console


C.

From SmartDashboard


D.

From the Dedicated Mobility Tab


Expert Solution
Questions # 34:

The Firewall kernel is replicated multiple times, therefore:

Options:

A.

The Firewall kernel only touches the packet if the connection is accelerated


B.

The Firewall can run different policies per core


C.

The Firewall kernel is replicated only with new connections and deletes itself once the connection times out


D.

The Firewall can run the same policy on all cores.


Expert Solution
Questions # 35:

SSL Network Extender (SNX) is a thin SSL VPN on-demand client that is installed on the remote user’s machine via the web browser. What are the two modes of SNX?

Options:

A.

Application and Client Service


B.

Network and Application


C.

Network and Layers


D.

Virtual Adapter and Mobile App


Expert Solution
Questions # 36:

Which of the SecureXL templates are enabled by default on Security Gateway?

Options:

A.

Accept


B.

Drop


C.

NAT


D.

None


Expert Solution
Questions # 37:

You have successfully backed up Check Point configurations without the OS information. What command would you use to restore this backup?

Options:

A.

restore_backup


B.

import backup


C.

cp_merge


D.

migrate import


Expert Solution
Questions # 38:

What happen when IPS profile is set in Detect Only Mode for troubleshooting?

Options:

A.

It will generate Geo-Protection traffic


B.

Automatically uploads debugging logs to Check Point Support Center


C.

It will not block malicious traffic


D.

Bypass licenses requirement for Geo-Protection control


Expert Solution
Questions # 39:

R81.20 management server can manage gateways with which versions installed?

Options:

A.

Versions R77 and higher


B.

Versions R76 and higher


C.

Versions R75.20 and higher


D.

Versions R75 and higher


Expert Solution
Questions # 40:

Which of the following authentication methods ARE NOT used for Mobile Access?

Options:

A.

RADIUS server


B.

Username and password (internal, LDAP)


C.

SecurID


D.

TACACS+


Expert Solution
Questions # 41:

Which of the following type of authentication on Mobile Access can NOT be used as the first authentication method?

Options:

A.

Dynamic ID


B.

RADIUS


C.

Username and Password


D.

Certificate


Expert Solution
Questions # 42:

Which command lists all tables in Gaia?

Options:

A.

fw tab –t


B.

fw tab –list


C.

fw-tab –s


D.

fw tab -1


Expert Solution
Questions # 43:

Your manager asked you to check the status of SecureXL, and its enabled templates and features. What command will you use to provide such information to manager?

Options:

A.

fw accel stat


B.

fwaccel stat


C.

fw acces stats


D.

fwaccel stats


Expert Solution
Questions # 44:

Which packet info is ignored with Session Rate Acceleration?

Options:

A.

source port ranges


B.

source ip


C.

source port


D.

same info from Packet Acceleration is used


Expert Solution
Questions # 45:

What SmartEvent component creates events?

Options:

A.

Consolidation Policy


B.

Correlation Unit


C.

SmartEvent Policy


D.

SmartEvent GUI


Expert Solution
Viewing page 3 out of 13 pages
Viewing questions 31-45 out of questions