Pass the Checkpoint CCSE R81 156-315.81 Questions and answers with CertsForce

Viewing page 8 out of 13 pages
Viewing questions 106-120 out of questions
Questions # 106:

In the Check Point Firewall Kernel Module, each Kernel is associated with a key, which specifies the type of traffic applicable to the chain module. For Stateful Mode configuration, chain modules marked with __________________ will not apply.

Options:

A.

ffff


B.

1


C.

3


D.

2


Expert Solution
Questions # 107:

What does it mean if Deyra sees the gateway status? (Choose the BEST answer.)

Question # 107

Options:

A.

SmartCenter Server cannot reach this Security Gateway.


B.

There is a blade reporting a problem.


C.

VPN software blade is reporting a malfunction.


D.

Security Gateway’s MGNT NIC card is disconnected.


Expert Solution
Questions # 108:

Which is not a blade option when configuring SmartEvent?

Options:

A.

Correlation Unit


B.

SmartEvent Unit


C.

SmartEvent Server


D.

Log Server


Expert Solution
Questions # 109:

Which of the following is NOT a VPN routing option available in a star community?

Options:

A.

To satellites through center only.


B.

To center, or through the center to other satellites, to Internet and other VPN targets.


C.

To center and to other satellites through center.


D.

To center only.


Expert Solution
Questions # 110:

Ken wants to obtain a configuration lock from other administrator on R81 Security Management Server. He can do this via WebUI or via CLI.

Which command should he use in CLI? (Choose the correct answer.)

Options:

A.

remove database lock


B.

The database feature has one command lock database override.


C.

override database lock


D.

The database feature has two commands lock database override and unlock database. Both will work.


Expert Solution
Questions # 111:

Which of the following is NOT an option to calculate the traffic direction?

Options:

A.

Incoming


B.

Internal


C.

External


D.

Outgoing


Expert Solution
Questions # 112:

SmartEvent provides a convenient way to run common command line executables that can assist in investigating events. Right-clicking the IP address, source or destination, in an event provides a list of default and customized commands. They appear only on cells that refer to IP addresses because the IP address of the active cell is used as the destination of the command when run. The default commands are:

Options:

A.

ping, traceroute, netstat, and route


B.

ping, nslookup, Telnet, and route


C.

ping, whois, nslookup, and Telnet


D.

ping, traceroute, netstat, and nslookup


Expert Solution
Questions # 113:

When deploying SandBlast, how would a Threat Emulation appliance benefit from the integration of ThreatCloud?

Options:

A.

ThreatCloud is a database-related application which is located on-premise to preserve privacy of company-related data


B.

ThreatCloud is a collaboration platform for all the CheckPoint customers to form a virtual cloud consisting of a combination of all on-premise private cloud environments


C.

ThreatCloud is a collaboration platform for Check Point customers to benefit from VMWare ESXi infrastructure which supports the Threat Emulation Appliances as virtual machines in the EMC Cloud


D.

ThreatCloud is a collaboration platform for all the Check Point customers to share information about malicious and benign files that all of the customers can benefit from as it makes emulation of known files unnecessary


Expert Solution
Questions # 114:

Which Check Point feature enables application scanning and the detection?

Options:

A.

Application Dictionary


B.

AppWiki


C.

Application Library


D.

CPApp


Expert Solution
Questions # 115:

What is the most ideal Synchronization Status for Security Management Server High Availability deployment?

Options:

A.

Lagging


B.

Synchronized


C.

Never been synchronized


D.

Collision


Expert Solution
Questions # 116:

You need to change the number of firewall Instances used by CoreXL. How can you achieve this goal?

Options:

A.

edit fwaffinity.conf; reboot required


B.

cpconfig; reboot required


C.

edit fwaffinity.conf; reboot not required


D.

cpconfig; reboot not required


Expert Solution
Questions # 117:

Check Point security components are divided into the following components:

Options:

A.

GUI Client, Security Gateway, WebUI Interface


B.

GUI Client, Security Management, Security Gateway


C.

Security Gateway, WebUI Interface, Consolidated Security Logs


D.

Security Management, Security Gateway, Consolidate Security Logs


Expert Solution
Questions # 118:

After trust has been established between the Check Point components, what is TRUE about name and IP-address changes?

Options:

A.

Security Gateway IP-address cannot be changed without re-establishing the trust.


B.

The Security Gateway name cannot be changed in command line without re-establishing trust.


C.

The Security Management Server name cannot be changed in SmartConsole without re-establishing trust.


D.

The Security Management Server IP-address cannot be changed without re-establishing the trust.


Expert Solution
Questions # 119:

What is the recommended number of physical network interfaces in a Mobile Access cluster deployment?

Options:

A.

4 Interfaces – an interface leading to the organization, a second interface leading to the internet, a third interface for synchronization, a fourth interface leading to the Security Management Server.


B.

3 Interfaces – an interface leading to the organization, a second interface leading to the Internet, a third interface for synchronization.


C.

1 Interface – an interface leading to the organization and the Internet, and configure for synchronization.


D.

2 Interfaces – a data interface leading to the organization and the Internet, a second interface for synchronization.


Expert Solution
Questions # 120:

Which tool is used to enable ClusterXL?

Options:

A.

SmartUpdate


B.

cpconfig


C.

SmartConsole


D.

sysconfig


Expert Solution
Viewing page 8 out of 13 pages
Viewing questions 106-120 out of questions