Check Point 156-315.81.20 Check Point Certified Security Expert – R81.20 Online Training
Check Point 156-315.81.20 Online Training
The questions for 156-315.81.20 were last updated at Nov 22,2024.
- Exam Code: 156-315.81.20
- Exam Name: Check Point Certified Security Expert - R81.20
- Certification Provider: Check Point
- Latest update: Nov 22,2024
Which command is used to set the CCP protocol to Multicast?
- A . cphaprob set_ccp multicast
- B . cphaconf set_ccp multicast
- C . cphaconf set_ccp no_broadcast
- D . cphaprob set_ccp no_broadcast
Which packet info is ignored with Session Rate Acceleration?
- A . source port ranges
- B . source ip
- C . source port
- D . same info from Packet Acceleration is used
Which is the least ideal Synchronization Status for Security Management Server High Availability deployment?
- A . Synchronized
- B . Never been synchronized
- C . Lagging
- D . Collision
During inspection of your Threat Prevention logs you find four different computers having one event each with a Critical Severity.
Which of those hosts should you try to remediate first?
- A . Host having a Critical event found by Threat Emulation
- B . Host having a Critical event found by IPS
- C . Host having a Critical event found by Antivirus
- D . Host having a Critical event found by Anti-Bot
In R81 spoofing is defined as a method of:
- A . Disguising an illegal IP address behind an authorized IP address through Port Address Translation.
- B . Hiding your firewall from unauthorized users.
- C . Detecting people using false or wrong authentication logins
- D . Making packets appear as if they come from an authorized IP address.
Connections to the Check Point R81 Web API use what protocol?
- A . HTTPS
- B . RPC
- C . VPN
- D . SIC
Which command lists all tables in Gaia?
- A . fw tab Ct
- B . fw tab Clist
- C . fw-tab Cs
- D . fw tab -1
What is true about the IPS-Blade?
- A . In R81, IPS is managed by the Threat Prevention Policy
- B . In R81, in the IPS Layer, the only three possible actions are Basic, Optimized and Strict
- C . In R81, IPS Exceptions cannot be attached to “all rules”
- D . In R81, the GeoPolicy Exceptions and the Threat Prevention Exceptions are the same
Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?
- A . Detects and blocks malware by correlating multiple detection engines before users are affected.
- B . Configure rules to limit the available network bandwidth for specified users or groups.
- C . Use UserCheck to help users understand that certain websites are against the company’s security policy.
- D . Make rules to allow or block applications and Internet sites for individual applications, categories, and risk levels.
What is a feature that enables VPN connections to successfully maintain a private and secure VPN session without employing Stateful Inspection?
- A . Stateful Mode
- B . VPN Routing Mode
- C . Wire Mode
- D . Stateless Mode