ExamGecko
Home / Checkpoint / 156-215.81 / List of questions
Ask Question

Checkpoint 156-215.81 Practice Test - Questions Answers, Page 7

List of questions

Question 61

Report Export Collapse

SmartEvent does NOT use which of the following procedures to identity events:

Matching a log against each event definition
Matching a log against each event definition
Create an event candidate
Create an event candidate
Matching a log against local exclusions
Matching a log against local exclusions
Matching a log against global exclusions
Matching a log against global exclusions
Suggested answer: C
Explanation:

The procedure that SmartEvent does not use to identify events is matching a log against local exclusions.Local exclusions are used to filter out logs that are not relevant for SmartLog, not SmartEvent12.SmartEvent uses the other procedures to identify events based on event definitions, event candidates, and global exclusions3.

Reference:SmartLog R81 Administration Guide,Check Point CCSA - R81: Practice Test & Explanation,SmartEvent R81 Administration Guide, [Free Check Point CCSA Sample Questions and Study Guide]

asked 16/09/2024
Ruud God
43 questions

Question 62

Report Export Collapse

John is using Management H

Which Smartcenter should be connected to for making changes?
Which Smartcenter should be connected to for making changes?
secondary Smartcenter
secondary Smartcenter
active Smartcenter
active Smartcenter
connect virtual IP of Smartcenter HA
connect virtual IP of Smartcenter HA
primary Smartcenter
primary Smartcenter
Suggested answer: B
Explanation:

The SmartCenter that should be connected to for making changes is the active SmartCenter. The active SmartCenter is the one that is currently synchronizing its configuration with the secondary SmartCenter and handling the communication with the gateways . The primary SmartCenter is the one that was initially configured as the main server, but it may become inactive if a failover occurs. The virtual IP of SmartCenter HA is used to access the SmartConsole, not to make changes.

Reference: [Security Management Server High Availability (HA) R81 Administration Guide], [Check Point CCSA - R81: Practice Test & Explanation], [How to configure ClusterXL High Availability on Security Management Server]

asked 16/09/2024
Luca Bombelli
40 questions

Question 63

Report Export Collapse

Which path below is available only when CoreXL is enabled?

Slow path
Slow path
Firewall path
Firewall path
Medium path
Medium path
Accelerated path
Accelerated path
Suggested answer: C
Explanation:

The path that is available only when CoreXL is enabled is the medium path. The medium path is used to handle packets that require deeper inspection by the Firewall and IPS blades, but do not need to go through the slow path . The slow path is used to handle packets that require stateful or out-of-state inspection by other blades, such as Application Control or VPN . The firewall path and the accelerated path are available regardless of CoreXL status .

Reference: [CoreXL R81 Administration Guide], [Check Point CCSA - R81: Practice Test & Explanation], [Check Point Security Gateway Architecture and Packet Flow], [Free Check Point CCSA Sample Questions and Study Guide]

asked 16/09/2024
Jesserey Joseph
44 questions

Question 64

Report Export Collapse

Which of the following describes how Threat Extraction functions?

Detect threats and provides a detailed report of discovered threats
Detect threats and provides a detailed report of discovered threats
Proactively detects threats
Proactively detects threats
Delivers file with original content
Delivers file with original content
Delivers PDF versions of original files with active content removed
Delivers PDF versions of original files with active content removed
Suggested answer: D
Explanation:

Threat Extraction delivers PDF versions of original files with active content removed, such as macros, embedded objects, and scripts.This ensures that users receive clean and safe files in seconds12.

Reference:Check Point SandBlast Zero-Day Protection,Check Point Threat Extraction

asked 16/09/2024
Ramesh Kumar Patel
38 questions

Question 65

Report Export Collapse

The SmartEvent R80 Web application for real-time event monitoring is called:

SmartView Monitor
SmartView Monitor
SmartEventWeb
SmartEventWeb
There is no Web application for SmartEvent
There is no Web application for SmartEvent
SmartView
SmartView
Suggested answer: D
Explanation:

SmartView is the web application for real-time event monitoring in SmartEvent R80 and above.It provides a unified view of security events across the network and allows for quick investigation and response34.

Reference:SmartEvent R80.40 Administration Guide,SmartView

asked 16/09/2024
FOTIS FOURLIAS
48 questions

Question 66

Report Export Collapse

SandBlast offers flexibility in implementation based on their individual business needs. What is an option for deployment of Check Point SandBlast Zero-Day Protection?

Smart Cloud Services
Smart Cloud Services
Load Sharing Mode Services
Load Sharing Mode Services
Threat Agent Solution
Threat Agent Solution
Public Cloud Services
Public Cloud Services
Suggested answer: A
Explanation:

Smart Cloud Services is an option for deployment of Check Point SandBlast Zero-Day Protection. It is a cloud-based service that provides advanced threat prevention for files and URLs, without requiring any on-premise infrastructure or appliances .

Reference: [Check Point SandBlast Zero-Day Protection], [Smart Cloud Services]

asked 16/09/2024
Adrien Gallais
45 questions

Question 67

Report Export Collapse

What SmartEvent component creates events?

Consolidation Policy
Consolidation Policy
Correlation Unit
Correlation Unit
SmartEvent Policy
SmartEvent Policy
SmartEvent GUI
SmartEvent GUI
Suggested answer: B
Explanation:

Correlation Unit is the SmartEvent component that creates events. It analyzes logs received from Security Gateways and Servers, and generates security events according to the definitions in the Consolidation Policy.

Reference: [SmartEvent R80.40 Administration Guide], [Correlation Unit]

asked 16/09/2024
Yun-Ting Lo
44 questions

Question 68

Report Export Collapse

Which Threat Prevention Profile is not included by default in R80 Management?

Basic -- Provides reliable protection on a range of non-HTTP protocols for servers, with minimal impact on network performance
Basic -- Provides reliable protection on a range of non-HTTP protocols for servers, with minimal impact on network performance
Optimized -- Provides excellent protection for common network products and protocols against recent or popular attacks
Optimized -- Provides excellent protection for common network products and protocols against recent or popular attacks
Strict -- Provides a wide coverage for all products and protocols, with impact on network performance
Strict -- Provides a wide coverage for all products and protocols, with impact on network performance
Recommended -- Provides all protection for all common network products and servers, with impact on network performance
Recommended -- Provides all protection for all common network products and servers, with impact on network performance
Suggested answer: D
Explanation:

The default Threat Prevention Profiles in R80 Management are Basic, Optimized, and Strict1. There is no Recommended profile by default. You can create a custom profile and name it Recommended, but it is not included by default.

Reference:Check Point R81 Threat Prevention Administration Guide

asked 16/09/2024
muhammad ikram
35 questions

Question 69

Report Export Collapse

When using Monitored circuit VRRP, what is a priority delta?

When an interface fails the priority changes to the priority delta
When an interface fails the priority changes to the priority delta
When an interface fails the delta claims the priority
When an interface fails the delta claims the priority
When an interface fails the priority delta is subtracted from the priority
When an interface fails the priority delta is subtracted from the priority
When an interface fails the priority delta decides if the other interfaces takes over
When an interface fails the priority delta decides if the other interfaces takes over
Suggested answer: C
Explanation:

When using Monitored circuit VRRP, the priority delta is the value that is subtracted from the priority of a cluster member when one of its monitored interfaces fails2. For example, if the priority of a cluster member is 100 and the priority delta is 10, then when one of its monitored interfaces fails, its priority becomes 90.

Reference:Check Point R81 ClusterXL Administration Guide

asked 16/09/2024
Khaled Mohamed Abdraboh Metwalli
37 questions

Question 70

Report Export Collapse

Which of the following is NOT an option to calculate the traffic direction?

Incoming
Incoming
Internal
Internal
External
External
Outgoing
Outgoing
Suggested answer: D
Explanation:

The options to calculate the traffic direction are Incoming, Internal, and External3. Outgoing is not an option. Incoming traffic is traffic that enters the Security Gateway from an external network. Internal traffic is traffic that originates and terminates in networks that are directly connected to the Security Gateway. External traffic is traffic that originates or terminates in networks that are not directly connected to the Security Gateway.

Reference:Check Point R81 Security Management Administration Guide

asked 16/09/2024
Maija Janite
41 questions
Total 401 questions
Go to page: of 41