Checkpoint 156-315.81 Practice Test - Questions Answers, Page 5
List of questions
Related questions
There are 4 ways to use the Management API for creating host object with R81 Management API. Which one is NOT correct?
CoreXL is supported when one of the following features is enabled:
You noticed that CPU cores on the Security Gateway are usually 100% utilized and many packets were dropped. You don't have a budget to perform a hardware upgrade at this time. To optimize drops you decide to use Priority Queues and fully enable Dynamic Dispatcher. How can you enable them?
Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidates management console. CPM allows the GUI client and management server to communicate via web services using ___________.
Which command is used to set the CCP protocol to Multicast?
Which packet info is ignored with Session Rate Acceleration?
Which is the least ideal Synchronization Status for Security Management Server High Availability deployment?
During inspection of your Threat Prevention logs you find four different computers having one event each with a Critical Severity. Which of those hosts should you try to remediate first?
In R81 spoofing is defined as a method of:
Connections to the Check Point R81 Web API use what protocol?
Question