Pass the Checkpoint CCSE R81 156-315.81 Questions and answers with CertsForce

Viewing page 5 out of 13 pages
Viewing questions 61-75 out of questions
Questions # 61:

Why is a Central License the preferred and recommended method of licensing?

Options:

A.

Central Licensing actually not supported with Gaia.


B.

Central Licensing is the only option when deploying Gala.


C.

Central Licensing ties to the IP address of a gateway and can be changed to any gateway if needed.


D.

Central Licensing ties to the IP address of the management server and is not dependent on the IP of any gateway in the event it changes.


Expert Solution
Questions # 62:

In which VPN community is a satellite VPN gateway not allowed to create a VPN tunnel with another satellite VPN gateway?

Options:

A.

Pentagon


B.

Combined


C.

Meshed


D.

Star


Expert Solution
Questions # 63:

What mechanism can ensure that the Security Gateway can communicate with the Management Server with ease in situations with overwhelmed network resources?

Options:

A.

The corresponding feature is new to R81.20 and is called "Management Data Plane Separation"


B.

The corresponding feature is called "Dynamic Dispatching"


C.

There is a feature for ensuring stable connectivity to the management server and is done via Priority Queuing.


D.

The corresponding feature is called "Dynamic Split"


Expert Solution
Questions # 64:

The Check Point installation history feature in provides the following:

Options:

A.

View install changes and install specific version


B.

Policy Installation Date only


C.

Policy Installation Date, view install changes and install specific version


D.

View install changes


Expert Solution
Questions # 65:

You have used the "set inactivity-timeout 120" command to prevent the session to be disconnected after 10 minutes of inactivity. However, the Web session is being disconnected after 10 minutes. Why?

Options:

A.

The idle timeout for the web session is specified with the "set web session-timeout" command.


B.

The number specified is the amount of the idle timeout in seconds rather than in minutes. So you have to use the command "set inactivity-timeout 600" instead.


C.

Probably, you have forgotten to make sure that nobody is accessing the management server via the SmartConsole which locks the management database.


D.

The number of minutes is correct. Probably, you have forgotten to save this setting with the "save config" command.


Expert Solution
Questions # 66:

How does the Anti-Virus feature of the Threat Prevention policy block traffic from infected websites?

Options:

A.

By dropping traffic from websites identified through ThreatCloud Verification and URL Caching


B.

By dropping traffic that is not proven to be from clean websites in the URL Filtering blade


C.

By allowing traffic from websites that are known to run Antivirus Software on servers regularly


D.

By matching logs against ThreatCloud information about the reputation of the website


Expert Solution
Questions # 67:

Which of the following processes pulls the application monitoring status from gateways?

Options:

A.

cpd


B.

cpwd


C.

cpm


D.

fwm


Expert Solution
Questions # 68:

Installations and upgrades with CPUSE require that the CPUSE agent is up-to-date. Usually the latest build is downloaded automatically. How can you verify the CPUSE agent build?

Options:

A.

In WebUI Status and Actions page or by running the following command in CLISH: show installer status build


B.

In WebUI Status and Actions page or by running the following command in CLISH: show installer status version


C.

In the Management Server or Gateway object in SmartConsole or by running the following command in CLISH: show installer status build


D.

In the Management Server or Gateway object in SmartConsole or by running the following command in CLISH: show installer agent


Expert Solution
Questions # 69:

In CoreXL, the Firewall kernel is replicated multiple times. Each replicated copy or instance can perform the following:

Options:

A.

The Firewall kernel only touches the packet if the connection is accelerated


B.

The Firewall kernel is replicated only with new connections and deletes itself once the connection times out


C.

The Firewall can run the same policy on all cores


D.

The Firewall can run different policies per core


Expert Solution
Questions # 70:

Fill in the blank: Authentication rules are defined for ________ .

Options:

A.

User groups


B.

Users using UserCheck


C.

Individual users


D.

All users in the database


Expert Solution
Questions # 71:

According to out of the box SmartEvent policy, which blade will automatically be correlated into events?

Options:

A.

Firewall


B.

VPN


C.

IPS


D.

HTTPS


Expert Solution
Questions # 72:

Which one is not a valid upgrade method to R81.20?

Options:

A.

RPM Upgrade


B.

Upgrade with Migration


C.

Advanced Upgrade


D.

CPUSE Upgrade


Expert Solution
Questions # 73:

Name the file that is an electronically signed file used by Check Point to translate the features in the license into a code?

Options:

A.

Both License (.lic) and Contract (.xml) files


B.

cp.macro


C.

Contract file (.xml)


D.

license File (.lic)


Expert Solution
Questions # 74:

What is the biggest benefit of policy layers?

Options:

A.

To break one policy into several virtual policies


B.

Policy Layers and Sub-Policies enable flexible control over the security policy


C.

They improve the performance on OS kernel version 3.0


D.

To include Threat Prevention as a sub policy for the firewall policy


Expert Solution
Questions # 75:

Which option, when applied to a rule, allows traffic to VPN gateways in specific VPN communities?

Options:

A.

All Connections (Clear or Encrypted)


B.

Accept all encrypted traffic


C.

Specific VPN Communities


D.

All Site-to-Site VPN Communities


Expert Solution
Viewing page 5 out of 13 pages
Viewing questions 61-75 out of questions