Check Point 156-315.81.20 Check Point Certified Security Expert – R81.20 Online Training
Check Point 156-315.81.20 Online Training
The questions for 156-315.81.20 were last updated at Nov 23,2024.
- Exam Code: 156-315.81.20
- Exam Name: Check Point Certified Security Expert - R81.20
- Certification Provider: Check Point
- Latest update: Nov 23,2024
You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each profile defines a(n) _____ or _____ action for the file types.
- A . Inspect/Bypass
- B . Inspect/Prevent
- C . Prevent/Bypass
- D . Detect/Bypass
When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?
- A . None, Security Management Server would be installed by itself.
- B . SmartConsole
- C . SecureClient
- D . Security Gateway
- E . SmartEvent
On R81.20 when configuring Third-Party devices to read the logs using the LEA (Log Export API) the default Log Server uses port:
- A . 18210
- B . 18184
- C . 257
- D . 18191
How many images are included with Check Point TE appliance in Recommended Mode?
- A . 2(OS) images
- B . images are chosen by administrator during installation
- C . as many as licensed for
- D . the newest image
What is the least amount of CPU cores required to enable CoreXL?
- A . 2
- B . 1
- C . 4
- D . 6
You are working with multiple Security Gateways enforcing an extensive number of rules.
To simplify security administration, which action would you choose?
- A . Eliminate all possible contradictory rules such as the Stealth or Cleanup rules.
- B . Create a separate Security Policy package for each remote Security Gateway.
- C . Create network objects that restricts all applicable rules to only certain networks.
- D . Run separate SmartConsole instances to login and configure each Security Gateway directly.
Which of the following authentication methods ARE NOT used for Mobile Access?
- A . RADIUS server
- B . Username and password (internal, LDAP)
- C . SecurID
- D . TACACS+
What is the correct command to observe the Sync traffic in a VRRP environment?
- A . fw monitor Ce “accept[12:4,b]=224.0.0.18;”
- B . fw monitor Ce “accept port(6118;”
- C . fw monitor Ce “accept proto=mcVRRP;”
- D . fw monitor Ce “accept dst=224.0.0.18;”
What has to be taken into consideration when configuring Management HA?
- A . The Database revisions will not be synchronized between the management servers
- B . SmartConsole must be closed prior to synchronized changes in the objects database
- C . If you wanted to use Full Connectivity Upgrade, you must change the Implied Rules to allow FW1_cpredundant to pass before the Firewall Control Connections.
- D . For Management Server synchronization, only External Virtual Switches are supported. So, if you wanted to employ Virtual Routers instead, you have to reconsider your design.
What is the difference between an event and a log?
- A . Events are generated at gateway according to Event Policy
- B . A log entry becomes an event when it matches any rule defined in Event Policy
- C . Events are collected with SmartWorkflow form Trouble Ticket systems
- D . Log and Events are synonyms