ExamGecko
Home Home / Checkpoint / 156-215.81

Checkpoint 156-215.81 Practice Test - Questions Answers, Page 7

Question list
Search
Search

SmartEvent does NOT use which of the following procedures to identity events:

A.
Matching a log against each event definition
A.
Matching a log against each event definition
Answers
B.
Create an event candidate
B.
Create an event candidate
Answers
C.
Matching a log against local exclusions
C.
Matching a log against local exclusions
Answers
D.
Matching a log against global exclusions
D.
Matching a log against global exclusions
Answers
Suggested answer: C

Explanation:

The procedure that SmartEvent does not use to identify events is matching a log against local exclusions.Local exclusions are used to filter out logs that are not relevant for SmartLog, not SmartEvent12.SmartEvent uses the other procedures to identify events based on event definitions, event candidates, and global exclusions3.

Reference:SmartLog R81 Administration Guide,Check Point CCSA - R81: Practice Test & Explanation,SmartEvent R81 Administration Guide, [Free Check Point CCSA Sample Questions and Study Guide]

John is using Management H

A.
Which Smartcenter should be connected to for making changes?
A.
Which Smartcenter should be connected to for making changes?
Answers
B.
secondary Smartcenter
B.
secondary Smartcenter
Answers
C.
active Smartcenter
C.
active Smartcenter
Answers
D.
connect virtual IP of Smartcenter HA
D.
connect virtual IP of Smartcenter HA
Answers
E.
primary Smartcenter
E.
primary Smartcenter
Answers
Suggested answer: B

Explanation:

The SmartCenter that should be connected to for making changes is the active SmartCenter. The active SmartCenter is the one that is currently synchronizing its configuration with the secondary SmartCenter and handling the communication with the gateways . The primary SmartCenter is the one that was initially configured as the main server, but it may become inactive if a failover occurs. The virtual IP of SmartCenter HA is used to access the SmartConsole, not to make changes.

Reference: [Security Management Server High Availability (HA) R81 Administration Guide], [Check Point CCSA - R81: Practice Test & Explanation], [How to configure ClusterXL High Availability on Security Management Server]

Which path below is available only when CoreXL is enabled?

A.
Slow path
A.
Slow path
Answers
B.
Firewall path
B.
Firewall path
Answers
C.
Medium path
C.
Medium path
Answers
D.
Accelerated path
D.
Accelerated path
Answers
Suggested answer: C

Explanation:

The path that is available only when CoreXL is enabled is the medium path. The medium path is used to handle packets that require deeper inspection by the Firewall and IPS blades, but do not need to go through the slow path . The slow path is used to handle packets that require stateful or out-of-state inspection by other blades, such as Application Control or VPN . The firewall path and the accelerated path are available regardless of CoreXL status .

Reference: [CoreXL R81 Administration Guide], [Check Point CCSA - R81: Practice Test & Explanation], [Check Point Security Gateway Architecture and Packet Flow], [Free Check Point CCSA Sample Questions and Study Guide]

Which of the following describes how Threat Extraction functions?

A.
Detect threats and provides a detailed report of discovered threats
A.
Detect threats and provides a detailed report of discovered threats
Answers
B.
Proactively detects threats
B.
Proactively detects threats
Answers
C.
Delivers file with original content
C.
Delivers file with original content
Answers
D.
Delivers PDF versions of original files with active content removed
D.
Delivers PDF versions of original files with active content removed
Answers
Suggested answer: D

Explanation:

Threat Extraction delivers PDF versions of original files with active content removed, such as macros, embedded objects, and scripts.This ensures that users receive clean and safe files in seconds12.

Reference:Check Point SandBlast Zero-Day Protection,Check Point Threat Extraction

The SmartEvent R80 Web application for real-time event monitoring is called:

A.
SmartView Monitor
A.
SmartView Monitor
Answers
B.
SmartEventWeb
B.
SmartEventWeb
Answers
C.
There is no Web application for SmartEvent
C.
There is no Web application for SmartEvent
Answers
D.
SmartView
D.
SmartView
Answers
Suggested answer: D

Explanation:

SmartView is the web application for real-time event monitoring in SmartEvent R80 and above.It provides a unified view of security events across the network and allows for quick investigation and response34.

Reference:SmartEvent R80.40 Administration Guide,SmartView

SandBlast offers flexibility in implementation based on their individual business needs. What is an option for deployment of Check Point SandBlast Zero-Day Protection?

A.
Smart Cloud Services
A.
Smart Cloud Services
Answers
B.
Load Sharing Mode Services
B.
Load Sharing Mode Services
Answers
C.
Threat Agent Solution
C.
Threat Agent Solution
Answers
D.
Public Cloud Services
D.
Public Cloud Services
Answers
Suggested answer: A

Explanation:

Smart Cloud Services is an option for deployment of Check Point SandBlast Zero-Day Protection. It is a cloud-based service that provides advanced threat prevention for files and URLs, without requiring any on-premise infrastructure or appliances .

Reference: [Check Point SandBlast Zero-Day Protection], [Smart Cloud Services]

What SmartEvent component creates events?

A.
Consolidation Policy
A.
Consolidation Policy
Answers
B.
Correlation Unit
B.
Correlation Unit
Answers
C.
SmartEvent Policy
C.
SmartEvent Policy
Answers
D.
SmartEvent GUI
D.
SmartEvent GUI
Answers
Suggested answer: B

Explanation:

Correlation Unit is the SmartEvent component that creates events. It analyzes logs received from Security Gateways and Servers, and generates security events according to the definitions in the Consolidation Policy.

Reference: [SmartEvent R80.40 Administration Guide], [Correlation Unit]

Which Threat Prevention Profile is not included by default in R80 Management?

A.
Basic -- Provides reliable protection on a range of non-HTTP protocols for servers, with minimal impact on network performance
A.
Basic -- Provides reliable protection on a range of non-HTTP protocols for servers, with minimal impact on network performance
Answers
B.
Optimized -- Provides excellent protection for common network products and protocols against recent or popular attacks
B.
Optimized -- Provides excellent protection for common network products and protocols against recent or popular attacks
Answers
C.
Strict -- Provides a wide coverage for all products and protocols, with impact on network performance
C.
Strict -- Provides a wide coverage for all products and protocols, with impact on network performance
Answers
D.
Recommended -- Provides all protection for all common network products and servers, with impact on network performance
D.
Recommended -- Provides all protection for all common network products and servers, with impact on network performance
Answers
Suggested answer: D

Explanation:

The default Threat Prevention Profiles in R80 Management are Basic, Optimized, and Strict1. There is no Recommended profile by default. You can create a custom profile and name it Recommended, but it is not included by default.

Reference:Check Point R81 Threat Prevention Administration Guide

When using Monitored circuit VRRP, what is a priority delta?

A.
When an interface fails the priority changes to the priority delta
A.
When an interface fails the priority changes to the priority delta
Answers
B.
When an interface fails the delta claims the priority
B.
When an interface fails the delta claims the priority
Answers
C.
When an interface fails the priority delta is subtracted from the priority
C.
When an interface fails the priority delta is subtracted from the priority
Answers
D.
When an interface fails the priority delta decides if the other interfaces takes over
D.
When an interface fails the priority delta decides if the other interfaces takes over
Answers
Suggested answer: C

Explanation:

When using Monitored circuit VRRP, the priority delta is the value that is subtracted from the priority of a cluster member when one of its monitored interfaces fails2. For example, if the priority of a cluster member is 100 and the priority delta is 10, then when one of its monitored interfaces fails, its priority becomes 90.

Reference:Check Point R81 ClusterXL Administration Guide

Which of the following is NOT an option to calculate the traffic direction?

A.
Incoming
A.
Incoming
Answers
B.
Internal
B.
Internal
Answers
C.
External
C.
External
Answers
D.
Outgoing
D.
Outgoing
Answers
Suggested answer: D

Explanation:

The options to calculate the traffic direction are Incoming, Internal, and External3. Outgoing is not an option. Incoming traffic is traffic that enters the Security Gateway from an external network. Internal traffic is traffic that originates and terminates in networks that are directly connected to the Security Gateway. External traffic is traffic that originates or terminates in networks that are not directly connected to the Security Gateway.

Reference:Check Point R81 Security Management Administration Guide

Total 401 questions
Go to page: of 41