Pass the Checkpoint CCSE R81 156-315.81 Questions and answers with CertsForce

Viewing page 4 out of 13 pages
Viewing questions 46-60 out of questions
Questions # 46:

Identify the API that is not supported by Check Point currently.

Options:

A.

R81 Management API-


B.

Identity Awareness Web Services API


C.

Open REST API


D.

OPSEC SDK


Expert Solution
Questions # 47:

Connections to the Check Point R81 Web API use what protocol?

Options:

A.

HTTPS


B.

RPC


C.

VPN


D.

SIC


Expert Solution
Questions # 48:

Which software blade does NOT accompany the Threat Prevention policy?

Options:

A.

Anti-virus


B.

IPS


C.

Threat Emulation


D.

Application Control and URL Filtering


Expert Solution
Questions # 49:

Packet acceleration (SecureXL) identifies connections by several attributes. Which of the attributes is NOT used for identifying connection?

Options:

A.

Source Address


B.

Destination Address


C.

TCP Acknowledgment Number


D.

Source Port


Expert Solution
Questions # 50:

What is the default shell for the command line interface?

Options:

A.

Expert


B.

Clish


C.

Admin


D.

Normal


Expert Solution
Questions # 51:

An administrator wishes to enable Identity Awareness on the Check Point firewalls. However, they allow users to use company issued or personal laptops. Since the administrator cannot manage the personal laptops, which of the following methods would BEST suit this company?

Options:

A.

AD Query


B.

Terminal Servers Agent


C.

Identity Agents


D.

Browser-Based Authentication


Expert Solution
Questions # 52:

Which TCP port does the CPM process listen on?

Options:

A.

18191


B.

18190


C.

8983


D.

19009


Expert Solution
Questions # 53:

You want to allow your Mobile Access Users to connect to an internal file share. Adding the Mobile Application 'File Share' to your Access Control Policy in the SmartConsole didn't work. You will be only allowed to select Services for the 'Service & Application' column How to fix it?

Options:

A.

A Quantum Spark Appliance is selected as Installation Target for the policy packet.


B.

The Mobile Access Blade is not enabled for the Access Control Layer of the policy.


C.

The Mobile Access Policy Source under Gateway properties Is set to Legacy Policy and not to Unified Access Policy.


D.

The Mobile Access Blade is not enabled under Gateway properties.


Expert Solution
Questions # 54:

Bob is going to prepare the import of the exported R81.20 management database. Now he wants to verify that the installed tools on the new target security management machine are able to handle the R81.20 release. Which of the following Check Point command is true?

Options:

A.

$FWDIR/scripts/migrate_server print_installed_tools -v R77.30


B.

$CPDIR/scripts/migrate_server print_installed_tools -v R81.20


C.

$FWDIR/scripts/migrate_server print_installed_tools -v R81.20


D.

$FWDIR/scripts/migrate_server print_uninstalled_tools -v R81.20


Expert Solution
Questions # 55:

What is "Accelerated Policy Installation"?

Options:

A.

Starting R81, the Desktop Security Policy installation process is accelerated thereby reducing the duration of the process significantly


B.

Starting R81, the QoS Policy installation process is accelerated thereby reducing the duration of the process significantly


C.

Starting R81, the Access Control Policy installation process is accelerated thereby reducing the duration of the process significantly


D.

Starting R81, the Threat Prevention Policy installation process is accelerated thereby reducing the duration of the process significantly


Expert Solution
Questions # 56:

Which of the following is NOT a type of Endpoint Identity Agent?

Options:

A.

Terminal


B.

Light


C.

Full


D.

Custom


Expert Solution
Questions # 57:

What are the correct sleps upgrading a HA cluster (Ml is active. M2 is passive) using Multi-Version Cluster(MVC) Upgrade?

Options:

A.

1) Enable the MVC mechanism on both cluster members «cphaprob mvc on

2) Upgrade the passive node M2 to R81.20

3) In SmartConsole. change the version of the cluster object

4) Install the Access Control Policy and make sure that the installation will not stop if installation on one cluster member fails

5) After examine the cluster states upgrade node M1 to R81.20

6) On each Cluster Member, disable the MVC


B.

1) Enable the MVC mechanism on both cluster members #cphaprob mvc on

2) Upgrade the passive node M2 to R81.20

3) In SmartConsole. change the version of the cluster object

4) Install the Access Control Policy

5) After examine the cluster states upgrade node M1 to R81.20

6) On each Cluster Member, disable the MVC mechanism and Install the Access Control Policy


C.

1) In SmartConsole. change the version of the cluster object

2) Upgrade the passive node M2 to R81.20

3) Enable the MVC mechanism on the upgraded R81.20 Cluster Member M2 Wcphaconf mvc on

4) Install the Access Control Policy and make sure that the installation will not stop if installation on one cluster member fails

5) After examine the cluster states upgrade node M1 to R81.20

6) On each Cluster Member,


D.

1) Upgrade the passive node M2 to R81.20

2) Enable the MVC mechanism on the upgraded R81.20 Cluster Member M2 ttcphaconf mvc on

3) In SmartConsole, change the version of the cluster object 4} Install the Access Control Policy

5) After examine the cluster states upgrade node M1 to R81.20

6) On each Cluster Member, disable the MVC mechanism and Install the Access Control Policy upgrade the passive node M2 to R81


Expert Solution
Questions # 58:

What CLI utility runs connectivity tests from a Security Gateway to an AD domain controller?

Options:

A.

test_connectivity_ad –d


B.

test_ldap_connectivity –d


C.

test_ad_connectivity –d


D.

ad_connectivity_test –d


Expert Solution
Questions # 59:

The fwd process on the Security Gateway sends logs to the fwd process on the Management Server, where it is forwarded to___________via____________

Options:

A.

cpd, fwm


B.

cpm, cpd


C.

fwm, cpd


D.

cpwd, fwssd


Expert Solution
Questions # 60:

Bob has finished io setup provisioning a secondary security management server. Now he wants to check if the provisioning has been correct. Which of the following Check Point command can be used to check if the security management server has been installed as a primary or a secondary security management server?

Options:

A.

cpprod_util MgmtlsPrimary


B.

cpprod_util FwlsSecondary


C.

cpprod_util MgmtlsSecondary


D.

cpprod_util FwlsPrimary


Expert Solution
Viewing page 4 out of 13 pages
Viewing questions 46-60 out of questions