Check Point 156-315.81.20 Check Point Certified Security Expert – R81.20 Online Training
Check Point 156-315.81.20 Online Training
The questions for 156-315.81.20 were last updated at Nov 23,2024.
- Exam Code: 156-315.81.20
- Exam Name: Check Point Certified Security Expert - R81.20
- Certification Provider: Check Point
- Latest update: Nov 23,2024
What happen when IPS profile is set in Detect Only Mode for troubleshooting?
- A . It will generate Geo-Protection traffic
- B . Automatically uploads debugging logs to Check Point Support Center
- C . It will not block malicious traffic
- D . Bypass licenses requirement for Geo-Protection control
What is true about VRRP implementations?
- A . VRRP membership is enabled in cpconfig
- B . VRRP can be used together with ClusterXL, but with degraded performance
- C . You cannot have a standalone deployment
- D . You cannot have different VRIDs in the same physical network
The Security Gateway is installed on GAIA R81. The default port for the Web User Interface is ______.
- A . TCP 18211
- B . TCP 257
- C . TCP 4433
- D . TCP 443
Fill in the blank: The R81 feature _____ permits blocking specific IP addresses for a specified time period.
- A . Block Port Overflow
- B . Local Interface Spoofing
- C . Suspicious Activity Monitoring
- D . Adaptive Threat Prevention
In a Client to Server scenario, which inspection point is the first point immediately following the tables and rule base check of a packet coming from outside of the network?
- A . Big l
- B . Little o
- C . Little i
- D . Big O
What is the mechanism behind Threat Extraction?
- A . This a new mechanism which extracts malicious files from a document to use it as a counter-attack against its sender.
- B . This is a new mechanism which is able to collect malicious files out of any kind of file types to destroy it prior to sending it to the intended recipient.
- C . This is a new mechanism to identify the IP address of the sender of malicious codes and put it into the SAM database (Suspicious Activity Monitoring).
- D . Any active contents of a document, such as JavaScripts, macros and links will be removed from the document and forwarded to the intended recipient, which makes this solution very fast.
You want to gather and analyze threats to your mobile device. It has to be a lightweight app.
Which application would you use?
- A . SmartEvent Client Info
- B . SecuRemote
- C . Check Point Protect
- D . Check Point Capsule Cloud
Which of the following is a new R81 Gateway feature that had not been available in R77.X and older?
- A . The rule base can be built of layers, each containing a set of the security rules. Layers are inspected in the order in which they are defined, allowing control over the rule base flow and which security functionalities take precedence.
- B . Limits the upload and download throughput for streaming media in the company to 1 Gbps.
- C . Time object to a rule to make the rule active only during specified times.
- D . Sub Policies ae sets of rules that can be created and attached to specific rules. If the rule is matched, inspection will continue in the sub policy attached to it rather than in the next rule.
fwssd is a child process of which of the following Check Point daemons?
- A . fwd
- B . cpwd
- C . fwm
- D . cpd