ExamGecko
Home Home / Checkpoint / 156-315.81

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 27

Question list
Search
Search

What is the minimum amount of RAM needed for a Threat Prevention Appliance?

A.
6 GB
A.
6 GB
Answers
B.
8GB with Gaia in 64-bit mode
B.
8GB with Gaia in 64-bit mode
Answers
C.
4 GB
C.
4 GB
Answers
D.
It depends on the number of software blades enabled
D.
It depends on the number of software blades enabled
Answers
Suggested answer: C

Explanation:

According to the Check Point Resource Library, the minimum amount of RAM needed for a Threat Prevention Appliance is 4 GB. This applies to both physical and virtual appliances. The other options are either incorrect or irrelevant.

Reference:Check Point Resource Library

You can access the ThreatCloud Repository from:

A.
R81.20 SmartConsole and Application Wiki
A.
R81.20 SmartConsole and Application Wiki
Answers
B.
Threat Prevention and Threat Tools
B.
Threat Prevention and Threat Tools
Answers
C.
Threat Wiki and Check Point Website
C.
Threat Wiki and Check Point Website
Answers
D.
R81.20 SmartConsole and Threat Prevention
D.
R81.20 SmartConsole and Threat Prevention
Answers
Suggested answer: D

Explanation:

According to the Check Point R81 release notes, you can access the ThreatCloud Repository from R81.20 SmartConsole and Threat Prevention. The ThreatCloud Repository is a cloud-based service that provides real-time threat intelligence and updates to Check Point products. The other options are either outdated or nonexistent.

Reference:Check Point R81

Which path below is available only when CoreXL is enabled?

A.
Slow path
A.
Slow path
Answers
B.
Firewall path
B.
Firewall path
Answers
C.
Medium path
C.
Medium path
Answers
D.
Accelerated path
D.
Accelerated path
Answers
Suggested answer: C

Explanation:

According to the Check Point R81 training course, the medium path is available only when CoreXL is enabled. CoreXL is a performance-enhancing technology that allows multiple CPU cores to process traffic simultaneously. The medium path handles packets that require deeper inspection or content awareness, such as IPS, Anti-Virus, or URL Filtering. The other paths are either available regardless of CoreXL or not valid terms.

Reference:Certified Security Expert (CCSE) R81.20 Course Overview

Capsule Connect and Capsule Workspace both offer secured connection for remote users who are using their mobile devices. However, there are differences between the two.

Which of the following statements correctly identify each product's capabilities?

A.
Workspace supports ios operating system, Android, and WP8, whereas Connect supports ios operating system and Android only
A.
Workspace supports ios operating system, Android, and WP8, whereas Connect supports ios operating system and Android only
Answers
B.
For compliance/host checking, Workspace offers the MDM cooperative enforcement, whereas Connect offers both jailbreak/root detection and MDM cooperative enforcement.
B.
For compliance/host checking, Workspace offers the MDM cooperative enforcement, whereas Connect offers both jailbreak/root detection and MDM cooperative enforcement.
Answers
C.
For credential protection, Connect uses One-time Password login support and has no SSO support, whereas Workspace offers both One-Time Password and certain SSO login support.
C.
For credential protection, Connect uses One-time Password login support and has no SSO support, whereas Workspace offers both One-Time Password and certain SSO login support.
Answers
D.
Workspace can support any application, whereas Connect has a limited number of application types which it will support.
D.
Workspace can support any application, whereas Connect has a limited number of application types which it will support.
Answers
Suggested answer: C

Explanation:

According to the Check Point website, Capsule Connect and Capsule Workspace both offer secured connection for remote users who are using their mobile devices. However, there are differences between the two. For credential protection, Connect uses One-time Password login support and has no SSO support, whereas Workspace offers both One-Time Password and certain SSO login support. The other statements are either false or partially true.

Reference: Capsule Connect and Capsule Workspace

You want to verify if your management server is ready to upgrade to R81.20. What tool could you use in this process?

A.
migrate export
A.
migrate export
Answers
B.
upgrade_tools verify
B.
upgrade_tools verify
Answers
C.
pre_upgrade_verifier
C.
pre_upgrade_verifier
Answers
D.
migrate import
D.
migrate import
Answers
Suggested answer: C

Explanation:

According to the Check Point website, you can use the pre_upgrade_verifier tool to verify if your management server is ready to upgrade to R81.20. This tool checks the compatibility of your current configuration and database with the target version, and provides a detailed report of any issues or warnings. The other tools are either used for exporting or importing databases, or not valid tools.

Reference: Upgrade Verification Service

GAiA Software update packages can be imported and installed offline in situation where:

A.
Security Gateway with GAiA does NOT have SFTP access to Internet
A.
Security Gateway with GAiA does NOT have SFTP access to Internet
Answers
B.
Security Gateway with GAiA does NOT have access to Internet.
B.
Security Gateway with GAiA does NOT have access to Internet.
Answers
C.
Security Gateway with GAiA does NOT have SSH access to Internet.
C.
Security Gateway with GAiA does NOT have SSH access to Internet.
Answers
D.
The desired CPUSE package is ONLY available in the Check Point CLOUD.
D.
The desired CPUSE package is ONLY available in the Check Point CLOUD.
Answers
Suggested answer: B

Explanation:

According to the Check Point website, GAiA Software update packages can be imported and installed offline in situation where the Security Gateway with GAiA does not have access to Internet. This allows you to manually download the packages from another device and transfer them to the Security Gateway using a USB drive or other media. The other situations are either not relevant or not possible.

Reference: Offline Software Updates

What statement best describes the Proxy ARP feature for Manual NAT in R81.20?

A.
Automatic proxy ARP configuration can be enabled
A.
Automatic proxy ARP configuration can be enabled
Answers
B.
Translate Destination on Client Side should be configured
B.
Translate Destination on Client Side should be configured
Answers
C.
fw ctl proxy should be configured
C.
fw ctl proxy should be configured
Answers
D.
local.arp file must always be configured
D.
local.arp file must always be configured
Answers
Suggested answer: D

Explanation:

According to the Check Point R81 training course, the Proxy ARP feature for Manual NAT in R81.20 requires the configuration of the local.arp file on the Security Gateway. This file contains the mapping of IP addresses to MAC addresses for NATed hosts. The other options are either incorrect or irrelevant.

Reference:Certified Security Expert (CCSE) R81.20 Course Overview

The system administrator of a company is trying to find out why acceleration is not working for the traffic. The traffic is allowed according to the rule base and checked for viruses. But it is not accelerated.

What is the most likely reason that the traffic is not accelerated?

A.
There is a virus found. Traffic is still allowed but not accelerated.
A.
There is a virus found. Traffic is still allowed but not accelerated.
Answers
B.
The connection required a Security server.
B.
The connection required a Security server.
Answers
C.
Acceleration is not enabled.
C.
Acceleration is not enabled.
Answers
D.
The traffic is originating from the gateway itself.
D.
The traffic is originating from the gateway itself.
Answers
Suggested answer: B

Explanation:

According to the Check Point R81 release notes, acceleration is not supported for connections that require a Security server, such as HTTPS Inspection, Content Awareness, or Anti-Virus. The Security server performs deep inspection and modification of the traffic, which prevents acceleration. The other options are either false or not the most likely reason.

Reference:Check Point R81

Which blades and or features are not supported in R81?

A.
SmartEvent Maps
A.
SmartEvent Maps
Answers
B.
SmartEvent
B.
SmartEvent
Answers
C.
Identity Awareness
C.
Identity Awareness
Answers
D.
SmartConsole Toolbars
D.
SmartConsole Toolbars
Answers
Suggested answer: A

Explanation:

According to the Check Point website, SmartEvent Maps is a feature that was supported in previous versions of SmartEvent, but is not supported in R81. SmartEvent Maps displayed a graphical representation of security events on a world map. The other options are either supported or not valid features in R81.

Reference: SmartEvent Maps

Which application should you use to install a contract file?

A.
SmartView Monitor
A.
SmartView Monitor
Answers
B.
WebUI
B.
WebUI
Answers
C.
SmartUpdate
C.
SmartUpdate
Answers
D.
SmartProvisioning
D.
SmartProvisioning
Answers
Suggested answer: C

Explanation:

According to the Check Point website, SmartUpdate is the application that should be used to install a contract file. A contract file contains information about the licenses and services that are purchased from Check Point. SmartUpdate can also be used to install software packages and patches on Security Gateways and Management Servers. The other applications are either not relevant or not capable of installing a contract file.

Reference: SmartUpdate

Total 626 questions
Go to page: of 63