ExamGecko
Home / Checkpoint / 156-315.81 / List of questions
Ask Question

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 54

Add to Whishlist

List of questions

Question 531

Report Export Collapse

Which Correction mechanisms are available with ClusterXL under R81.20?

Become a Premium Member for full access
  Unlock Premium Member

Question 532

Report Export Collapse

Which upgrade method you should use upgrading from R80.40 to R81.20 to avoid any downtime?

Become a Premium Member for full access
  Unlock Premium Member

Question 533

Report Export Collapse

How can you see historical data with cpview?

Become a Premium Member for full access
  Unlock Premium Member

Question 534

Report Export Collapse

Alice & Bob are concurrently logged In via SSH on the same Check Point Security Gateway as user 'admin* however Bob was first logged in and acquired the lock Alice Is not aware that Bob is also togged in to the same Security Management Server as she is but she needs to perform very urgent configuration changes - which of the following GAlAclish command is true for overriding Bobs configuration database lock:

Become a Premium Member for full access
  Unlock Premium Member

Question 535

Report Export Collapse

What command is used to manually failover a cluster during a zero-downtime upgrade?

Become a Premium Member for full access
  Unlock Premium Member

Question 536

Report Export Collapse

Packet acceleration (SecureXL) identities connections by several attributes. Which of the attributes is NOT used for identifying connection?

Become a Premium Member for full access
  Unlock Premium Member

Question 537

Report Export Collapse

What is required for a site-to-site VPN tunnel that does not use certificates?

Become a Premium Member for full access
  Unlock Premium Member

Question 538

Report Export Collapse

Using AD Query, the security gateway connections to the Active Directory Domain Controllers using what protocol?

Become a Premium Member for full access
  Unlock Premium Member

Question 539

Report Export Collapse

Name the file that is an electronically signed file used by Check Point to translate the features in the license into a code?

Become a Premium Member for full access
  Unlock Premium Member

Question 540

Report Export Collapse

What technologies are used to deny or permit network traffic?

Become a Premium Member for full access
  Unlock Premium Member
Total 626 questions
Go to page: of 63