Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Check Point Certified Security Expert R81.20 ( 156-315.81.20 )

Last Update 3 hours ago Total Questions : 636

The Check Point Certified Security Expert R81.20 ( 156-315.81.20 ) content is now fully updated, with all current exam questions added 3 hours ago. Deciding to include 156-315.81 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our 156-315.81 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these 156-315.81 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Check Point Certified Security Expert R81.20 ( 156-315.81.20 ) practice test comfortably within the allotted time.

Question # 151

The log server sends what to the Correlation Unit?

A.

Authentication requests

B.

CPMI dbsync

C.

Logs

D.

Event Policy

Question # 152

Please choose the path to monitor the compliance status of the Check Point R81.20 based management.

A.

Gateways & Servers -- > Compliance View

B.

Compliance blade not available under R81.20

C.

Logs & Monitor -- > New Tab -- > Open compliance View

D.

Security & Policies -- > New Tab -- > Compliance View

Question # 153

The Correlation Unit performs all but the following actions:

A.

Marks logs that individually are not events, but may be part of a larger pattern to be identified later.

B.

Generates an event based on the Event policy.

C.

Assigns a severity level to the event.

D.

Takes a new log entry that is part of a group of items that together make up an event, and adds it to an ongoing event.

Question # 154

With Mobile Access enabled, administrators select the web-based and native applications that can be accessed by remote users and define the actions that users can perform the applications. Mobile Access encrypts all traffic using:

A.

HTTPS for web-based applications and 3DES or RC4 algorithm for native applications. For end users to access the native applications, they need to install the SSL Network Extender.

B.

HTTPS for web-based applications and AES or RSA algorithm for native applications. For end users to access the native application, they need to install the SSL Network Extender.

C.

HTTPS for web-based applications and 3DES or RC4 algorithm for native applications. For end users to access the native applications, no additional software is required.

D.

HTTPS for web-based applications and AES or RSA algorithm for native applications. For end users to access the native application, no additional software is required.

Question # 155

Which of the following is NOT an attribute of packet acceleration?

A.

Source address

B.

Protocol

C.

Destination port

D.

VLAN Tag

Question # 156

UserCheck objects in the Application Control and URL Filtering rules allow the gateway to communicate with the users. Which action is not supported in UserCheck objects?

A.

Ask

B.

Drop

C.

Inform

D.

Reject

Question # 157

Due to high CPU workload on the Security Gateway, the security administrator decided to purchase a new multicore CPU to replace the existing single core CPU. After installation, is the administrator required to perform any additional tasks?

A.

After upgrading the hardware, increase the number of kernel instances using cpconfig

B.

Hyperthreading must be enabled in the bios to use CoreXL

C.

Run cprestart from dish

D.

Administrator does not need to perform any task. Check Point will make use of the newly installed CPU and Cores.

Question # 158

When users connect to the Mobile Access portal they are unable to open File Shares.

Which log file would you want to examine?

A.

cvpnd.elg

B.

httpd.elg

C.

vpnd.elg

D.

fw.elg

Question # 159

Which utility allows you to configure the DHCP service on Gaia from the command line?

A.

ifconfig

B.

dhcp_ofg

C.

sysconfig

D.

cpconfig

Question # 160

What is correct statement about Security Gateway and Security Management Server failover in Check Point R81.X in terms of Check Point Redundancy driven solution?

A.

Security Gateway failover is an automatic procedure but Security Management Server failover is a manual procedure.

B.

Security Gateway failover as well as Security Management Server failover is a manual procedure.

C.

Security Gateway failover is a manual procedure but Security Management Server failover is an automatic procedure.

D.

Security Gateway failover as well as Security Management Server failover is an automatic procedure.

Question # 161

Pamela is Cyber Security Engineer working for Global Instance Firm with large scale deployment of Check Point Enterprise Appliances using GAiA/R81.20. Company’s Developer Team is having random access issue to newly deployed Application Server in DMZ’s Application Server Farm Tier and blames DMZ Security Gateway as root cause. The ticket has been created and issue is at Pamela’s desk for an investigation. Pamela decides to use Check Point’s Packet Analyzer Tool-fw monitor to iron out the issue during approved Maintenance window.

What do you recommend as the best suggestion for Pamela to make sure she successfully captures entire traffic in context of Firewall and problematic traffic?

A.

Pamela should check SecureXL status on DMZ Security gateway and if it’s turned ON. She should turn OFF SecureXL before using fw monitor to avoid misleading traffic captures.

B.

Pamela should check SecureXL status on DMZ Security Gateway and if it’s turned OFF. She should turn ON SecureXL before using fw monitor to avoid misleading traffic captures.

C.

Pamela should use tcpdump over fw monitor tool as tcpdump works at OS-level and captures entire traffic.

D.

Pamela should use snoop over fw monitor tool as snoop works at NIC driver level and captures entire traffic.

Question # 162

What command lists all interfaces using Multi-Queue?

A.

cpmq get

B.

show interface all

C.

cpmq set

D.

show multiqueue all

Question # 163

What is the order of NAT priorities?

A.

Static NAT, IP pool NAT, hide NAT

B.

IP pool NAT, static NAT, hide NAT

C.

Static NAT, automatic NAT, hide NAT

D.

Static NAT, hide NAT, IP pool NAT

Question # 164

Which of the following is NOT a VPN routing option available in a star community?

A.

To satellites through center only.

B.

To center, or through the center to other satellites, to Internet and other VPN targets.

C.

To center and to other satellites through center.

D.

To center only.

Question # 165

Ken wants to obtain a configuration lock from other administrator on R81 Security Management Server. He can do this via WebUI or via CLI.

Which command should he use in CLI? (Choose the correct answer.)

A.

remove database lock

B.

The database feature has one command lock database override.

C.

override database lock

D.

The database feature has two commands lock database override and unlock database. Both will work.

Go to page: