ExamGecko
Home Home / Checkpoint / 156-315.81

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 13

Question list
Search
Search

When simulating a problem on ClusterXL cluster with cphaprob --d STOP -s problem -t 0 register, to initiate a failover on an active cluster member, what command allows you remove the problematic state?

A.
cphaprob --d STOP unregister
A.
cphaprob --d STOP unregister
Answers
B.
cphaprob STOP unregister
B.
cphaprob STOP unregister
Answers
C.
cphaprob unregister STOP
C.
cphaprob unregister STOP
Answers
D.
cphaprob --d unregister STOP
D.
cphaprob --d unregister STOP
Answers
Suggested answer: A

Explanation:

When simulating a problem on a ClusterXL cluster with the command 'cphaprob --d STOP -s problem -t 0 register' to initiate a failover on an active cluster member, you can use the command 'cphaprob --d STOP unregister' to remove the problematic state and return the cluster to normal operation.

Option A correctly identifies the command that allows you to remove the problematic state, making it the verified answer.

How would you deploy TE250X Check Point appliance just for email traffic and in-line mode without a Check Point Security Gateway?

A.
Install appliance TE250X on SpanPort on LAN switch in MTA mode.
A.
Install appliance TE250X on SpanPort on LAN switch in MTA mode.
Answers
B.
Install appliance TE250X in standalone mode and setup MTA.
B.
Install appliance TE250X in standalone mode and setup MTA.
Answers
C.
You can utilize only Check Point Cloud Services for this scenario.
C.
You can utilize only Check Point Cloud Services for this scenario.
Answers
D.
It is not possible, always Check Point SGW is needed to forward emails to SandBlast appliance.
D.
It is not possible, always Check Point SGW is needed to forward emails to SandBlast appliance.
Answers
Suggested answer: C

Explanation:

To deploy a TE250X Check Point appliance just for email traffic and in-line mode without a Check Point Security Gateway, you can utilize Check Point Cloud Services. In this scenario, you can leverage cloud-based email security services provided by Check Point without the need for an on-premises Security Gateway.

Option C correctly states that you can use only Check Point Cloud Services for this scenario, making it the verified answer.

What is the main difference between Threat Extraction and Threat Emulation?

A.
Threat Emulation never delivers a file and takes more than 3 minutes to complete.
A.
Threat Emulation never delivers a file and takes more than 3 minutes to complete.
Answers
B.
Threat Extraction always delivers a file and takes less than a second to complete.
B.
Threat Extraction always delivers a file and takes less than a second to complete.
Answers
C.
Threat Emulation never delivers a file that takes less than a second to complete.
C.
Threat Emulation never delivers a file that takes less than a second to complete.
Answers
D.
Threat Extraction never delivers a file and takes more than 3 minutes to complete.
D.
Threat Extraction never delivers a file and takes more than 3 minutes to complete.
Answers
Suggested answer: B

Explanation:

Threat Extraction (Answer B): Threat Extraction always delivers a file, but it removes potentially malicious content from the file before delivering it to the user. It is designed to provide a safe version of the file quickly, taking less than a second to complete.

Threat Emulation (Option A): Threat Emulation does not deliver the original file to the user until it has been thoroughly analyzed for threats. It may take more than 3 minutes to complete the analysis. The emphasis here is on safety and thorough inspection, which may result in a longer processing time.

Therefore, Option B correctly describes the main difference between Threat Extraction and Threat Emulation.

When Dynamic Dispatcher is enabled, connections are assigned dynamically with the exception of:

A.
Threat Emulation
A.
Threat Emulation
Answers
B.
HTTPS
B.
HTTPS
Answers
C.
QOS
C.
QOS
Answers
D.
VoIP
D.
VoIP
Answers
Suggested answer: D

Explanation:

When Dynamic Dispatcher is enabled, it dynamically assigns connections, but there are exceptions. The exception mentioned in the question is:

VoIP (Option D): VoIP connections are an exception when Dynamic Dispatcher is enabled. They are not assigned dynamically but follow a different rule set to ensure quality and reliability for VoIP traffic.

The other options, Threat Emulation (Option A), HTTPS (Option B), and QoS (Option C), are dynamically assigned when Dynamic Dispatcher is enabled.

SandBlast offers flexibility in implementation based on their individual business needs. What is an option for deployment of Check Point SandBlast Zero-Day Protection?

A.
Smart Cloud Services
A.
Smart Cloud Services
Answers
B.
Load Sharing Mode Services
B.
Load Sharing Mode Services
Answers
C.
Threat Agent Solution
C.
Threat Agent Solution
Answers
D.
Public Cloud Services
D.
Public Cloud Services
Answers
Suggested answer: A

Explanation:

Check Point SandBlast Zero-Day Protection offers flexibility in implementation to meet individual business needs. One of the deployment options for Check Point SandBlast Zero-Day Protection is:

Smart Cloud Services (Option A): Smart Cloud Services allow organizations to leverage cloud-based threat intelligence and protection services provided by Check Point.

The other options, Load Sharing Mode Services (Option B), Threat Agent Solution (Option C), and Public Cloud Services (Option D), may also be components of a security strategy, but they are not specific deployment options for Check Point SandBlast Zero-Day Protection.

Which of the following is NOT a component of Check Point Capsule?

A.
Capsule Docs
A.
Capsule Docs
Answers
B.
Capsule Cloud
B.
Capsule Cloud
Answers
C.
Capsule Enterprise
C.
Capsule Enterprise
Answers
D.
Capsule Workspace
D.
Capsule Workspace
Answers
Suggested answer: C

Explanation:

Check Point Capsule is a suite of solutions designed to provide comprehensive mobile security and secure access. The components of Check Point Capsule include:

Capsule Docs (Option A): A component that secures document sharing and protects sensitive data.

Capsule Cloud (Option B): A component that provides cloud-based security services.

Capsule Workspace (Option D): A component that provides secure workspace on mobile devices.

Option C, 'Capsule Enterprise,' is not a recognized component of Check Point Capsule based on the available information. Therefore, it is the correct answer as the component that is NOT part of Check Point Capsule.

What is the purpose of Priority Delta in VRRP?

A.
When a box up, Effective Priority = Priority + Priority Delta
A.
When a box up, Effective Priority = Priority + Priority Delta
Answers
B.
When an Interface is up, Effective Priority = Priority + Priority Delta
B.
When an Interface is up, Effective Priority = Priority + Priority Delta
Answers
C.
When an Interface fail, Effective Priority = Priority -- Priority Delta
C.
When an Interface fail, Effective Priority = Priority -- Priority Delta
Answers
D.
When a box fail, Effective Priority = Priority -- Priority Delta
D.
When a box fail, Effective Priority = Priority -- Priority Delta
Answers
Suggested answer: C

Explanation:

Each instance of VRRP running on a supported interface may monitor the link state of other interfaces. The monitored interfaces do not have to be running VRRP.

If a monitored interface loses its link state, then VRRP will decrement its priority over a VRID by the specified delta value and then will send out a new VRRP HELLO packet. If the new effective priority is less than the priority a backup platform has, then the backup platform will begin to send out its own HELLO packet.

Once the master sees this packet with a priority greater than its own, then it releases the VIP.

Which statements below are CORRECT regarding Threat Prevention profiles in Smart Dashboard?

A.
You can assign only one profile per gateway and a profile can be assigned to one rule Only.
A.
You can assign only one profile per gateway and a profile can be assigned to one rule Only.
Answers
B.
You can assign multiple profiles per gateway and a profile can be assigned to one rule only.
B.
You can assign multiple profiles per gateway and a profile can be assigned to one rule only.
Answers
C.
You can assign multiple profiles per gateway and a profile can be assigned to one or more rules.
C.
You can assign multiple profiles per gateway and a profile can be assigned to one or more rules.
Answers
D.
You can assign only one profile per gateway and a profile can be assigned to one or more rules.
D.
You can assign only one profile per gateway and a profile can be assigned to one or more rules.
Answers
Suggested answer: C

Explanation:

In SmartDashboard, Threat Prevention profiles can be assigned to one or more rules. This means that you can have multiple profiles assigned to a single gateway, and each of these profiles can be associated with one or more rules. This allows for granular control over threat prevention settings for different rules or scenarios.

Using ClusterXL, what statement is true about the Sticky Decision Function?

A.
Can only be changed for Load Sharing implementations
A.
Can only be changed for Load Sharing implementations
Answers
B.
All connections are processed and synchronized by the pivot
B.
All connections are processed and synchronized by the pivot
Answers
C.
Is configured using cpconfig
C.
Is configured using cpconfig
Answers
D.
Is only relevant when using SecureXL
D.
Is only relevant when using SecureXL
Answers
Suggested answer: A

Explanation:

The Sticky Decision Function in ClusterXL is primarily used in Load Sharing implementations. In Load Sharing, the pivot member is responsible for determining the destination of new connections and ensures that traffic from the same source IP address is directed to the same cluster member. This ensures session stickiness for the same source IP, improving load sharing efficiency.

What is the name of the secure application for Mail/Calendar for mobile devices?

A.
Capsule Workspace
A.
Capsule Workspace
Answers
B.
Capsule Mail
B.
Capsule Mail
Answers
C.
Capsule VPN
C.
Capsule VPN
Answers
D.
Secure Workspace
D.
Secure Workspace
Answers
Suggested answer: A

Explanation:

The secure application for Mail/Calendar for mobile devices in Check Point is called 'Capsule Workspace.' Capsule Workspace provides secure access to email and calendar data on mobile devices while maintaining security policies and controls.

Total 626 questions
Go to page: of 63