Checkpoint 156-315.81 Practice Test - Questions Answers, Page 7

List of questions
Question 61

Fill in the blank: The command ___________________ provides the most complete restoration of a R81 configuration.
Question 62

Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidated management console. It empowers the migration from legacy Client-side logic to Server-side logic. The cpm process:
Question 63

Which of the following type of authentication on Mobile Access can NOT be used as the first authentication method?
Question 64

Which of the SecureXL templates are enabled by default on Security Gateway?
Question 65

What happen when IPS profile is set in Detect Only Mode for troubleshooting?
It is recommended to enable Detect-Only for Troubleshooting on the profile during the initial installation of IPS. This option overrides any protections that are set to Prevent so that they will not block any traffic.
During this time you can analyze the alerts that IPS generates to see how IPS will handle network traffic, while avoiding any impact on the flow of traffic.
Question 66

What is true about VRRP implementations?
Question 67

The Security Gateway is installed on GAIA R81. The default port for the Web User Interface is ______ .
Question 68

Fill in the blank: The R81 feature _____ permits blocking specific IP addresses for a specified time period.
Suspicious Activity Rules Solution
Suspicious Activity Rules is a utility integrated into SmartView Monitor that is used to modify access privileges upon detection of any suspicious network activity (for example, several attempts to gain unauthorized access).
The detection of suspicious activity is based on the creation of Suspicious Activity rules. Suspicious Activity rules are Firewall rules that enable the system administrator to instantly block suspicious connections that are not restricted by the currently enforced security policy. These rules, once set (usually with an expiration date), can be applied immediately without the need to perform an Install Policy operation.
Question 69

In a Client to Server scenario, which inspection point is the first point immediately following the tables and rule base check of a packet coming from outside of the network?
The inspection pointBig lis the first point immediately following the tables and rule base check of a packet coming from outside of the network.It is also the last point before the packet leaves the Security Gateway to the internal network1.The other inspection points are either before or after the rule base check, or in a different direction of traffic flow2.
Reference: Check Point R81 Security Gateway Architecture and Packet Flow,156-315.81 Checkpoint Exam Info and Free Practice Test - ExamTopics
Question 70

What is the mechanism behind Threat Extraction?
Threat Extraction is a technology that removes potentially malicious features that are known to be risky from files (macros, embedded objects and more), rather than determining their maliciousness.By cleaning the file before it enters the organization, Threat Extraction preemptively prevents both known and unknown threats, providing better protection against zero-day attacks1.Any active contents of a document, such as JavaScripts, macros and links will be removed from the document and forwarded to the intended recipient, which makes this solution very fast2. The other options are either incorrect or irrelevant to the mechanism behind Threat Extraction.
Reference:Threat Extraction (CDR) - Check Point Software,Check Point Document Threat Extraction Technology
Question