Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Check Point Certified Security Expert R81.20 ( 156-315.81.20 )

Last Update 3 hours ago Total Questions : 636

The Check Point Certified Security Expert R81.20 ( 156-315.81.20 ) content is now fully updated, with all current exam questions added 3 hours ago. Deciding to include 156-315.81 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our 156-315.81 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these 156-315.81 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Check Point Certified Security Expert R81.20 ( 156-315.81.20 ) practice test comfortably within the allotted time.

Question # 76

During the Check Point Stateful Inspection Process, for packets that do not pass Firewall Kernel Inspection and are rejected by the rule definition, packets are:

A.

Dropped without sending a negative acknowledgment

B.

Dropped without logs and without sending a negative acknowledgment

C.

Dropped with negative acknowledgment

D.

Dropped with logs and without sending a negative acknowledgment

Question # 77

NO: 219

What cloud-based SandBlast Mobile application is used to register new devices and users?

A.

Check Point Protect Application

B.

Management Dashboard

C.

Behavior Risk Engine

D.

Check Point Gateway

Question # 78

To ensure that VMAC mode is enabled, which CLI command should you run on all cluster members?

A.

fw ctl set int fwha vmac global param enabled

B.

fw ctl get int vmac global param enabled; result of command should return value 1

C.

cphaprob-a if

D.

fw ctl get int fwha_vmac_global_param_enabled; result of command should return value 1

Question # 79

With MTA (Mail Transfer Agent) enabled the gateways manages SMTP traffic and holds external email with potentially malicious attachments. What is required in order to enable MTA (Mail Transfer Agent) functionality in the Security Gateway?

A.

Threat Cloud Intelligence

B.

Threat Prevention Software Blade Package

C.

Endpoint Total Protection

D.

Traffic on port 25

Question # 80

With SecureXL enabled, accelerated packets will pass through the following:

A.

Network Interface Card, OSI Network Layer, OS IP Stack, and the Acceleration Device

B.

Network Interface Card, Check Point Firewall Kernal, and the Acceleration Device

C.

Network Interface Card and the Acceleration Device

D.

Network Interface Card, OSI Network Layer, and the Acceleration Device

Question # 81

How many policy layers do Access Control policy support?

A.

2

B.

4

C.

1

D.

3

Question # 82

What is not a purpose of the deployment of Check Point API?

A.

Execute an automated script to perform common tasks

B.

Create a customized GUI Client for manipulating the objects database

C.

Create products that use and enhance the Check Point solution

D.

Integrate Check Point products with 3rd party solution

Question # 83

Capsule Connect and Capsule Workspace both offer secured connection for remote users who are using their mobile devices. However, there are differences between the two.

Which of the following statements correctly identify each product ' s capabilities?

A.

Workspace supports ios operating system, Android, and WP8, whereas Connect supports ios operating system and Android only

B.

For compliance/host checking, Workspace offers the MDM cooperative enforcement, whereas Connect offers both jailbreak/root detection and MDM cooperative enforcement.

C.

For credential protection, Connect uses One-time Password login support and has no SSO support, whereas Workspace offers both One-Time Password and certain SSO login support.

D.

Workspace can support any application, whereas Connect has a limited number of application types which it will support.

Question # 84

Which SmartConsole tab is used to monitor network and security performance?

A.

Manage Setting

B.

Security Policies

C.

Gateway and Servers

D.

Logs and Monitor

Question # 85

Which application should you use to install a contract file?

A.

SmartView Monitor

B.

WebUI

C.

SmartUpdate

D.

SmartProvisioning

Question # 86

Which is NOT a SmartEvent component?

A.

SmartEvent Server

B.

Correlation Unit

C.

Log Consolidator

D.

Log Server

Question # 87

Fill in the blank: The “fw monitor” tool can be best used to troubleshoot ____________________.

A.

AV issues

B.

VPN errors

C.

Network traffic issues

D.

Authentication issues

Question # 88

Which Check Point feature enables application scanning and the detection?

A.

Application Dictionary

B.

AppWiki

C.

Application Library

D.

CPApp

Question # 89

Fill in the blank. Once a certificate is revoked from the Security Gateway by the Security Management Server, the certificate information is ________ .

A.

Sent to the Internal Certificate Authority.

B.

Sent to the Security Administrator.

C.

Stored on the Security Management Server.

D.

Stored on the Certificate Revocation List.

Question # 90

Fill in the blank: Identity Awareness AD-Query is using the Microsoft _______________ API to learn users from AD.

A.

WMI

B.

Eventvwr

C.

XML

D.

Services.msc

Go to page: