156-315.81.20 Demo and Sample
Note: Answers are below each question.
Samples are taken from full version.
Latest 156-315.81.20 Exam Questions and Practice Tests 2024 - Killexams.com
156-315.81.20 Dumps
156-315.81.20 Braindumps
156-315.81.20 Real Questions
156-315.81.20 Practice Test
156-315.81.20 Actual Questions
Checkpoint
156-315.81.20
Certified Security Expert - R81.20 (CCSE)
https://killexams.com/pass4sure/exam-detail/156-315.81.20
Question: 78
R81.10 management server can manage gateways with which versions installed?
Versions R77 and higher
Versions R76 and higher
Versions R75.20 and higher
Versions R75 and higher
Answer: C Question: 79
Which command can you use to verify the number of active concurrent connections?
fw conn all
fw ctl pstat
show all connections
show connections
Answer: B Question: 80
Which of the following statements is TRUE about R81 management plug-ins?
The plug-in is a package installed on the Security Gateway.
Installing a management plug-in requires a Snapshot, just like any upgrade process.
A management plug-in interacts with a Security Management Server to provide new features and support for new products.
Using a plug-in offers full central management only if special licensing is applied to specific features of the plug- in.
Answer: C Question: 81
How can SmartView application accessed?
http://<Security Management IP Address>/smartview
http://<Security Management IP Address>:4434/smartview/
https://<Security Management IP Address>/smartview/
https://<Security Management host name>:4434/smartview/
What command verifies that the API server is responding?
api stat
api status
show api_status
app_get_status
Answer: B Question: 83
Where you can see and search records of action done by R81 SmartConsole administrators?
In SmartView Tracker, open active log
In the Logs & Monitor view, select âOpen Audit Log Viewâ
In SmartAuditLog View
In Smartlog, all logs
Answer: B Question: 84
Fill in the blank: The R81 utility fw monitor is used to troubleshoot .
User data base corruption
LDAP conflicts
Traffic issues
Phase two key negotiations
Answer: C
Explanation:
Check Pointâs FW Monitor is a powerful built-in tool for capturing network traffic at the packet level. The FW Monitor utility captures network packets at multiple capture points along the FireWall inspection chains. These captured packets can be inspected later using the WireShark.
Question: 85
The Firewall kernel is replicated multiple times, therefore:
The Firewall kernel only touches the packet if the connection is accelerated
The Firewall can run different policies per core
The Firewall kernel is replicated only with new connections and deletes itself once the connection times out
The Firewall can run the same policy on all cores.
On a Security Gateway with CoreXL enabled, the Firewall kernel is replicated multiple times. Each replicated copy, or instance, runs on one processing core. These instances handle traffic concurrently, and each instance is a complete and independent inspection kernel. When CoreXL is enabled, all the kernel instances in the Security Gateway process traffic through the same interfaces and apply the same security policy.
Question: 86
Selecting an event displays its configurable properties in the Detail pane and a description of the event in the Description pane.
Which is NOT an option to adjust or configure?
Severity
Automatic reactions
Policy
Threshold
Answer: C Question: 87
To fully enable Dynamic Dispatcher with Firewall Priority Queues on a Security Gateway, run the following command in Expert mode then reboot:
fw ctl multik set_mode 1
fw ctl Dynamic_Priority_Queue on
fw ctl Dynamic_Priority_Queue enable
fw ctl multik set_mode 9
Answer: D Question: 88
Advanced Security Checkups can be easily conducted within:
Reports
Advanced
Checkups
Views
Summary
Answer: A Question: 89
What is the limitation of employing Sticky Decision Function?
With SDF enabled, the involved VPN Gateways only supports IKEv1
Acceleration technologies, such as SecureXL and CoreXL are disabled when activating SDF
With SDF enabled, only ClusterXL in legacy mode is supported
With SDF enabled, you can only have three Sync interfaces at most
Answer: B Question: 90
Which Mobile Access Application allows a secure container on Mobile devices to give users access to internal website, file share and emails?
Check Point Remote User
Check Point Capsule Workspace
Check Point Mobile Web Portal
Check Point Capsule Remote
Answer: C Question: 91
Which of the following process pulls application monitoring status?
fwd
fwm
cpwd
cpd
Answer: D Question: 92
To fully enable Dynamic Dispatcher on a Security Gateway:
run fw ctl multik set_mode 9 in Expert mode and then Reboot.
Using cpconfig, update the Dynamic Dispatcher value to âfullâ under the CoreXL menu.
Edit/proc/interrupts to include multik set_mode 1 at the bottom of the file, save, and reboot.
run fw multik set_mode 1 in Expert mode and then reboot.
Answer: A Question: 93
Session unique identifiers are passed to the web api using which http header option?
X-chkp-sid
Accept-Charset
Proxy-Authorization
Application
Answer: C Question: 94
Which command shows actual allowed connections in state table?
fw tab Ct StateTable
fw tab Ct connections
fw tab Ct connection
fw tab connections
Answer: B Question: 95
What SmartEvent component creates events?
Consolidation Policy
Correlation Unit
SmartEvent Policy
SmartEvent GUI
Answer: B Question: 96
Which command collects diagnostic data for analyzing customer setup remotely?
cpinfo
migrate export
sysinfo
cpview
Answer: A
Explanation:
CPInfo is an auto-updatable utility that collects diagnostics data on a customer's machine at the time of execution and uploads it to Check Point servers (it replaces the standalone cp_uploader utility for uploading files to Check Point servers).
The CPInfo output file allows analyzing customer setups from a remote location. Check Point support engineers can open the CPInfo file in a demo mode, while viewing actual customer Security Policies and Objects. This allows the in- depth analysis of customer's configuration and environment settings.
6$03/( 48(67,216
7KHVH TXHVWLRQV DUH IRU GHPR SXUSRVH RQO\ )XOO YHUVLRQ LV XS WR GDWH DQG FRQWDLQV DFWXDO TXHVWLRQV DQG DQVZHUV
.LOOH[DPV FRP LV DQ RQOLQH SODWIRUP WKDW RIIHUV D ZLGH UDQJH RI VHUYLFHV UHODWHG WR FHUWLILFDWLRQ H[DP SUHSDUDWLRQ 7KH SODWIRUP SURYLGHV DFWXDO TXHVWLRQV H[DP GXPSV DQG SUDFWLFH WHVWV WR KHOS LQGLYLGXDOV SUHSDUH IRU YDULRXV FHUWLILFDWLRQ H[DPV ZLWK FRQILGHQFH +HUH DUH VRPH NH\ IHDWXUHV DQG VHUYLFHV RIIHUHG E\ .LOOH[DPV FRP
$FWXDO ([DP 4XHVWLRQV .LOOH[DPV FRP SURYLGHV DFWXDO H[DP TXHVWLRQV WKDW DUH H[SHULHQFHG LQ WHVW FHQWHUV 7KHVH TXHVWLRQV DUH XSGDWHG UHJXODUO\ WR HQVXUH WKH\ DUH XS WR GDWH DQG UHOHYDQW WR WKH ODWHVW H[DP V\OODEXV %\ VWXG\LQJ WKHVH DFWXDO TXHVWLRQV FDQGLGDWHV FDQ IDPLOLDUL]H WKHPVHOYHV ZLWK WKH FRQWHQW DQG IRUPDW RI WKH UHDO H[DP
([DP 'XPSV .LOOH[DPV FRP RIIHUV H[DP GXPSV LQ 3') IRUPDW 7KHVH GXPSV FRQWDLQ D FRPSUHKHQVLYH FROOHFWLRQ RI TXHVWLRQV DQG DQVZHUV WKDW FRYHU WKH H[DP WRSLFV %\ XVLQJ WKHVH GXPSV FDQGLGDWHV FDQ HQKDQFH WKHLU NQRZOHGJH DQG LPSURYH WKHLU FKDQFHV RI VXFFHVV LQ WKH FHUWLILFDWLRQ H[DP
3UDFWLFH 7HVWV .LOOH[DPV FRP SURYLGHV SUDFWLFH WHVWV WKURXJK WKHLU GHVNWRS 9&( H[DP VLPXODWRU DQG RQOLQH WHVW HQJLQH 7KHVH SUDFWLFH WHVWV VLPXODWH WKH UHDO H[DP HQYLURQPHQW DQG KHOS FDQGLGDWHV DVVHVV WKHLU UHDGLQHVV IRU WKH DFWXDO H[DP 7KH SUDFWLFH WHVWV FRYHU D ZLGH UDQJH RI TXHVWLRQV DQG HQDEOH FDQGLGDWHV WR LGHQWLI\ WKHLU VWUHQJWKV DQG ZHDNQHVVHV
*XDUDQWHHG 6XFFHVV .LOOH[DPV FRP RIIHUV D VXFFHVV JXDUDQWHH ZLWK WKHLU H[DP GXPSV 7KH\ FODLP WKDW E\ XVLQJ WKHLU PDWHULDOV FDQGLGDWHV ZLOO SDVV WKHLU H[DPV RQ WKH ILUVW DWWHPSW RU WKH\ ZLOO UHIXQG WKH SXUFKDVH SULFH 7KLV JXDUDQWHH SURYLGHV DVVXUDQFH DQG FRQILGHQFH WR LQGLYLGXDOV SUHSDULQJ IRU FHUWLILFDWLRQ H[DPV
8SGDWHG &RQWHQW .LOOH[DPV FRP UHJXODUO\ XSGDWHV LWV TXHVWLRQ EDQN DQG H[DP GXPSV WR HQVXUH WKDW WKH\ DUH FXUUHQW DQG UHIOHFW WKH ODWHVW FKDQJHV LQ WKH H[DP V\OODEXV 7KLV KHOSV FDQGLGDWHV VWD\ XS WR GDWH ZLWK WKH H[DP FRQWHQW DQG LQFUHDVHV WKHLU FKDQFHV RI VXFFHVV
7HFKQLFDO 6XSSRUW .LOOH[DPV FRP SURYLGHV IUHH [ WHFKQLFDO VXSSRUW WR DVVLVW FDQGLGDWHV ZLWK DQ\ TXHULHV RU LVVXHV WKH\ PD\ HQFRXQWHU ZKLOH XVLQJ WKHLU VHUYLFHV 7KHLU FHUWLILHG H[SHUWV DUH DYDLODEOH WR SURYLGH JXLGDQFH DQG KHOS FDQGLGDWHV WKURXJKRXW WKHLU H[DP SUHSDUDWLRQ MRXUQH\
'PS .PSF FYBNT WJTJU IUUQT LJMMFYBNT DPN WFOEPST FYBN MJTU
.LOO \RXU H[DP DW )LUVW $WWHPSW *XDUDQWHHG
View Practice Questions »