Pass the Checkpoint CCSE R81 156-315.81 Questions and answers with CertsForce

Viewing page 9 out of 13 pages
Viewing questions 121-135 out of questions
Questions # 121:

Capsule Connect and Capsule Workspace both offer secured connection for remote users who are using their mobile devices. However, there are differences between the two.

Which of the following statements correctly identify each product's capabilities?

Options:

A.

Workspace supports ios operating system, Android, and WP8, whereas Connect supports ios operating system and Android only


B.

For compliance/host checking, Workspace offers the MDM cooperative enforcement, whereas Connect offers both jailbreak/root detection and MDM cooperative enforcement.


C.

For credential protection, Connect uses One-time Password login support and has no SSO support, whereas Workspace offers both One-Time Password and certain SSO login support.


D.

Workspace can support any application, whereas Connect has a limited number of application types which it will support.


Expert Solution
Questions # 122:

What are the methods of SandBlast Threat Emulation deployment?

Options:

A.

Cloud, Appliance and Private


B.

Cloud, Appliance and Hybrid


C.

Cloud, Smart-1 and Hybrid


D.

Cloud, OpenServer and Vmware


Expert Solution
Questions # 123:

SandBlast agent extends 0 day prevention to what part of the network?

Options:

A.

Web Browsers and user devices


B.

DMZ server


C.

Cloud


D.

Email servers


Expert Solution
Questions # 124:

What is the SandBlast Agent designed to do?

Options:

A.

Performs OS-level sandboxing for SandBlast Cloud architecture


B.

Ensure the Check Point SandBlast services is running on the end user’s system


C.

If malware enters an end user’s system, the SandBlast Agent prevents the malware from spreading with the network


D.

Clean up email sent with malicious attachments


Expert Solution
Questions # 125:

Which is NOT an example of a Check Point API?

Options:

A.

Gateway API


B.

Management API


C.

OPSEC SDK


D.

Threat Prevention API


Expert Solution
Questions # 126:

GAiA Software update packages can be imported and installed offline in situation where:

Options:

A.

Security Gateway with GAiA does NOT have SFTP access to Internet


B.

Security Gateway with GAiA does NOT have access to Internet.


C.

Security Gateway with GAiA does NOT have SSH access to Internet.


D.

The desired CPUSE package is ONLY available in the Check Point CLOUD.


Expert Solution
Questions # 127:

What key is used to save the current CPView page in a filename format cpview_”cpview process ID”.cap”number of captures”?

Options:

A.

S


B.

W


C.

C


D.

Space bar


Expert Solution
Questions # 128:

What is the order of NAT priorities?

Options:

A.

Static NAT, IP pool NAT, hide NAT


B.

IP pool NAT, static NAT, hide NAT


C.

Static NAT, automatic NAT, hide NAT


D.

Static NAT, hide NAT, IP pool NAT


Expert Solution
Questions # 129:

The SmartEvent R81 Web application for real-time event monitoring is called:

Options:

A.

SmartView Monitor


B.

SmartEventWeb


C.

There is no Web application for SmartEvent


D.

SmartView


Expert Solution
Questions # 130:

You can access the ThreatCloud Repository from:

Options:

A.

R81.20 SmartConsole and Application Wiki


B.

Threat Prevention and Threat Tools


C.

Threat Wiki and Check Point Website


D.

R81.20 SmartConsole and Threat Prevention


Expert Solution
Questions # 131:

Office mode means that:

Options:

A.

SecurID client assigns a routable MAC address. After the user authenticates for a tunnel, the VPN gateway assigns a routable IP address to the remote client.


B.

Users authenticate with an Internet browser and use secure HTTPS connection.


C.

Local ISP (Internet service Provider) assigns a non-routable IP address to the remote user.


D.

Allows a security gateway to assign a remote client an IP address. After the user authenticates for a tunnel, the VPN gateway assigns a routable IP address to the remote client.


Expert Solution
Questions # 132:

Which file gives you a list of all security servers in use, including port number?

Options:

A.

$FWDIR/conf/conf.conf


B.

$FWDIR/conf/servers.conf


C.

$FWDIR/conf/fwauthd.conf


D.

$FWDIR/conf/serversd.conf


Expert Solution
Questions # 133:

You have a Gateway is running with 2 cores. You plan to add a second gateway to build a cluster and used a device with 4 cores.

How many cores can be used in a Cluster for Firewall-kernel on the new device?

Options:

A.

3


B.

2


C.

1


D.

4


Expert Solution
Questions # 134:

Vanessa is firewall administrator in her company. Her company is using Check Point firewall on a central and several remote locations which are managed centrally by R77.30 Security Management Server. On central location is installed R77.30 Gateway on Open server. Remote locations are using Check Point UTM-1570 series appliances with R75.30 and some of them are using a UTM-1-Edge-X or Edge-W with latest available firmware. She is in process of migrating to R81.

What can cause Vanessa unnecessary problems, if she didn’t check all requirements for migration to R81?

Options:

A.

Missing an installed R77.20 Add-on on Security Management Server


B.

Unsupported firmware on UTM-1 Edge-W appliance


C.

Unsupported version on UTM-1 570 series appliance


D.

Unsupported appliances on remote locations


Expert Solution
Questions # 135:

What statement best describes the Proxy ARP feature for Manual NAT in R81.20?

Options:

A.

Automatic proxy ARP configuration can be enabled


B.

Translate Destination on Client Side should be configured


C.

fw ctl proxy should be configured


D.

local.arp file must always be configured


Expert Solution
Viewing page 9 out of 13 pages
Viewing questions 121-135 out of questions