Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Check Point Certified Security Expert R81.20 ( 156-315.81.20 )

Last Update 3 hours ago Total Questions : 636

The Check Point Certified Security Expert R81.20 ( 156-315.81.20 ) content is now fully updated, with all current exam questions added 3 hours ago. Deciding to include 156-315.81 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our 156-315.81 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these 156-315.81 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Check Point Certified Security Expert R81.20 ( 156-315.81.20 ) practice test comfortably within the allotted time.

Question # 136

Fill in the blank: With the User Directory Software Blade, you can create user definitions on a(n)_____________ Server.

A.

SecurID

B.

NT domain

C.

LDAP

D.

SMTP

Question # 137

What is the base level encryption key used by Capsule Docs?

A.

RSA 2048

B.

RSA 1024

C.

SHA-256

D.

AES

Question # 138

Identity Awareness allows easy configuration for network access and auditing based on what three items?

A.

Client machine IP address.

B.

Network location, the identity of a user and the identity of a machine

C.

Log server IP address.

D.

Gateway proxy IP address.

Question # 139

When performing a minimal effort upgrade, what will happen to the network traffic?

A.

All connections that were initiated before the upgrade will be dropped, causing network downtime

B.

All connections that were initiated before the upgrade will be handled normally

C.

All connections that were initiated before the upgrade will be handled by the standby gateway

D.

All connections that were initiated before the upgrade will be handled by the active gateway

Question # 140

Which Operating Systems are supported for the Endpoint Security VPN?

A.

Windows and x86 Solaris

B.

Windows and macOS computers

C.

Windows and SPARC Solaris

D.

Windows and Red Hat Linux

Question # 141

What order should be used when upgrading a Management High Availability Cluster?

A.

Secondary Management, then Primary Management

B.

Active Management, then Standby Management

C.

Standby Management, then Active Management

D.

Primary Management, then Secondary Management

Question # 142

What are the minimum open server hardware requirements for a Security Management Server/Standalone in R81?

A.

2 CPU cores, 4GB of RAM and 15GB of disk space

B.

8 CPU cores, 16GB of RAM and 500 GB of disk space

C.

4 CPU cores, 8GB of RAM and 500GB of disk space

D.

8 CPU cores, 32GB of RAM and 1 TB of disk space

Question # 143

Fill in the blank: Permanent VPN tunnels can be set on all tunnels in the community, on all tunnels for specific gateways, or ______ .

A.

On all satellite gateway to satellite gateway tunnels

B.

On specific tunnels for specific gateways

C.

On specific tunnels in the community

D.

On specific satellite gateway to central gateway tunnels

Question # 144

There are two R77.30 Security Gateways in the Firewall Cluster. They are named FW_A and FW_B. The cluster is configured to work as HA (High availability) with default cluster configuration. FW_A is configured to have higher priority than FW_B. FW_A was active and processing the traffic in the morning. FW_B was standby. Around 1100 am, its interfaces went down and this caused a failover. FW_B became active. After an hour, FW_A’s interface issues were resolved and it became operational.

When it re-joins the cluster, will it become active automatically?

A.

No, since ‘maintain’ current active cluster member’ option on the cluster object properties is enabled by default.

B.

No, since ‘maintain’ current active cluster member’ option is enabled by default on the Global Properties.

C.

Yes, since ‘Switch to higher priority cluster member’ option on the cluster object properties is enabled by default.

D.

Yes, since ‘Switch to higher priority cluster member’ option is enabled by default on the Global Properties.

Question # 145

Which command is used to add users to or from existing roles?

A.

Add rba user < User Name > roles < List >

B.

Add rba user < User Name >

C.

Add user < User Name > roles < List >

D.

Add user < User Name >

Question # 146

Which is the correct order of a log flow processed by SmartEvent components?

A.

Firewall > Correlation Unit > Log Server > SmartEvent Server Database > Smart E vent Client

B.

Firewall > SmartEvent Server Database > Correlation Unit > Log Server > Smart E vent Client

C.

Firewall > Log Server > SmartEvent Server Database > Correlation Unit > Smart E vent Client

D.

Firewall > Log Server > Correlation Unit > SmartEvent Server Database > Smart E vent Client

Question # 147

What destination versions are supported for a Multi-Version Cluster Upgrade?

A.

R77.30 and later

B.

R80.10 and Later

C.

R70 and Later

D.

R76 and later

Question # 148

The Compliance Blade allows you to search for text strings in many windows and panes, to search for a value in a field, what would your syntax be?

A.

field_name:string

B.

name field:string

C.

name_field:string

D.

field name:string

Question # 149

Gaia has two default user accounts that cannot be deleted. What are those user accounts?

A.

Admin and Default

B.

Expert and Clish

C.

Control and Monitor

D.

Admin and Monitor

Question # 150

Bob is asked by Alice to disable the SecureXL mechanism temporary tor further diagnostic by their Check Point partner. Which of the following Check Point Command is true:

A.

fwaccel suspend

B.

fwaccel standby

C.

fwaccel off

D.

fwaccel templates

Go to page: