ExamGecko
Home / Checkpoint / 156-315.81 / List of questions
Ask Question

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 13

Add to Whishlist

List of questions

Question 121

Report Export Collapse

When simulating a problem on ClusterXL cluster with cphaprob --d STOP -s problem -t 0 register, to initiate a failover on an active cluster member, what command allows you remove the problematic state?

cphaprob --d STOP unregister
cphaprob --d STOP unregister
cphaprob STOP unregister
cphaprob STOP unregister
cphaprob unregister STOP
cphaprob unregister STOP
cphaprob --d unregister STOP
cphaprob --d unregister STOP
Suggested answer: A
Explanation:

When simulating a problem on a ClusterXL cluster with the command 'cphaprob --d STOP -s problem -t 0 register' to initiate a failover on an active cluster member, you can use the command 'cphaprob --d STOP unregister' to remove the problematic state and return the cluster to normal operation.

Option A correctly identifies the command that allows you to remove the problematic state, making it the verified answer.

asked 16/09/2024
Bartosz Szewczyk
43 questions

Question 122

Report Export Collapse

How would you deploy TE250X Check Point appliance just for email traffic and in-line mode without a Check Point Security Gateway?

Install appliance TE250X on SpanPort on LAN switch in MTA mode.
Install appliance TE250X on SpanPort on LAN switch in MTA mode.
Install appliance TE250X in standalone mode and setup MTA.
Install appliance TE250X in standalone mode and setup MTA.
You can utilize only Check Point Cloud Services for this scenario.
You can utilize only Check Point Cloud Services for this scenario.
It is not possible, always Check Point SGW is needed to forward emails to SandBlast appliance.
It is not possible, always Check Point SGW is needed to forward emails to SandBlast appliance.
Suggested answer: C
Explanation:

To deploy a TE250X Check Point appliance just for email traffic and in-line mode without a Check Point Security Gateway, you can utilize Check Point Cloud Services. In this scenario, you can leverage cloud-based email security services provided by Check Point without the need for an on-premises Security Gateway.

Option C correctly states that you can use only Check Point Cloud Services for this scenario, making it the verified answer.

asked 16/09/2024
Alfredo Alfaro
51 questions

Question 123

Report Export Collapse

What is the main difference between Threat Extraction and Threat Emulation?

Threat Emulation never delivers a file and takes more than 3 minutes to complete.
Threat Emulation never delivers a file and takes more than 3 minutes to complete.
Threat Extraction always delivers a file and takes less than a second to complete.
Threat Extraction always delivers a file and takes less than a second to complete.
Threat Emulation never delivers a file that takes less than a second to complete.
Threat Emulation never delivers a file that takes less than a second to complete.
Threat Extraction never delivers a file and takes more than 3 minutes to complete.
Threat Extraction never delivers a file and takes more than 3 minutes to complete.
Suggested answer: B
Explanation:

Threat Extraction (Answer B): Threat Extraction always delivers a file, but it removes potentially malicious content from the file before delivering it to the user. It is designed to provide a safe version of the file quickly, taking less than a second to complete.

Threat Emulation (Option A): Threat Emulation does not deliver the original file to the user until it has been thoroughly analyzed for threats. It may take more than 3 minutes to complete the analysis. The emphasis here is on safety and thorough inspection, which may result in a longer processing time.

Therefore, Option B correctly describes the main difference between Threat Extraction and Threat Emulation.

asked 16/09/2024
Aaron Case
50 questions

Question 124

Report Export Collapse

When Dynamic Dispatcher is enabled, connections are assigned dynamically with the exception of:

Threat Emulation
Threat Emulation
HTTPS
HTTPS
QOS
QOS
VoIP
VoIP
Suggested answer: D
Explanation:

When Dynamic Dispatcher is enabled, it dynamically assigns connections, but there are exceptions. The exception mentioned in the question is:

VoIP (Option D): VoIP connections are an exception when Dynamic Dispatcher is enabled. They are not assigned dynamically but follow a different rule set to ensure quality and reliability for VoIP traffic.

The other options, Threat Emulation (Option A), HTTPS (Option B), and QoS (Option C), are dynamically assigned when Dynamic Dispatcher is enabled.

asked 16/09/2024
Shane Behrendt
39 questions

Question 125

Report Export Collapse

SandBlast offers flexibility in implementation based on their individual business needs. What is an option for deployment of Check Point SandBlast Zero-Day Protection?

Become a Premium Member for full access
  Unlock Premium Member

Question 126

Report Export Collapse

Which of the following is NOT a component of Check Point Capsule?

Become a Premium Member for full access
  Unlock Premium Member

Question 127

Report Export Collapse

What is the purpose of Priority Delta in VRRP?

Become a Premium Member for full access
  Unlock Premium Member

Question 128

Report Export Collapse

Which statements below are CORRECT regarding Threat Prevention profiles in Smart Dashboard?

Become a Premium Member for full access
  Unlock Premium Member

Question 129

Report Export Collapse

Using ClusterXL, what statement is true about the Sticky Decision Function?

Become a Premium Member for full access
  Unlock Premium Member

Question 130

Report Export Collapse

What is the name of the secure application for Mail/Calendar for mobile devices?

Become a Premium Member for full access
  Unlock Premium Member
Total 626 questions
Go to page: of 63