Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

156-315.81 Exam Dumps - Check Point Certified Security Expert R81.20

Go to page:
Question # 73

Which tool provides a list of trusted files to the administrator so they can specify to the Threat Prevention blade that these files do not need to be scanned or analyzed?

A.

ThreatWiki

B.

Whitelist Files

C.

AppWiki

D.

IPS Protections

Full Access
Question # 74

Which is NOT a SmartEvent component?

A.

SmartEvent Server

B.

Correlation Unit

C.

Log Consolidator

D.

Log Server

Full Access
Question # 75

What are the types of Software Containers?

A.

Three; security management, Security Gateway, and endpoint security

B.

Three; Security Gateway, endpoint security, and gateway management

C.

Two; security management and endpoint security

D.

Two; endpoint security and Security Gateway

Full Access
Question # 76

Fill in the blank: With the User Directory Software Blade, you can create user definitions on a(n)_____________ Server.

A.

SecurID

B.

NT domain

C.

LDAP

D.

SMTP

Full Access
Question # 77

What command is used to manually failover a Multi-Version Cluster during the upgrade?

A.

clusterXL_admin down in Expert Mode

B.

clusterXL_admin down in Clish

C.

set cluster member state down in Clish

D.

set cluster down in Expert Mode

Full Access
Question # 78

What kind of information would you expect to see when using the "sim affinity -I" command?

A.

Overview over SecureXL templated connections

B.

The VMACs used in a Security Gateway cluster

C.

Affinity Distribution

D.

The involved firewall kernel modules in inbound and outbound packet chain

Full Access
Question # 79

You have enabled “Full Log” as a tracking option to a security rule. However, you are still not seeing any data type information. What is the MOST likely reason?

A.

Logging has disk space issues. Change logging storage options on the logging server or Security Management Server properties and install database.

B.

Data Awareness is not enabled.

C.

Identity Awareness is not enabled.

D.

Logs are arriving from Pre-R81 gateways.

Full Access
Question # 80

According to the policy installation flow the transfer state (CPTA) is responsible for the code generated by the FWM. On the Security Gateway side a process receives them and first stores them Into a temporary directory. Which process is true for receiving these Tiles;

A.

FWD

B.

CPD

C.

FWM

D.

RAD

Full Access
Go to page: