Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

156-315.81 Exam Dumps - Check Point Certified Security Expert R81.20

Go to page:
Question # 65

Which is the command to identify the NIC driver before considering about the employment of the Multi-Queue feature?

A.

show interface eth0 mq

B.

ethtool A eth0

C.

ifconfig -i eth0 verbose

D.

ip show Int eth0

Full Access
Question # 66

There are multiple types of licenses for the various VPN components and types. License type related to management and functioning of Remote Access VPNs are - which of the following license requirement statement is NOT true:

A.

MobileAccessLicense ° This license is required on the Security Gateway for the following Remote Access solutions

B.

EndpointPolicyManagementLicense ° The Endpoint Security Suite includes blades other than the Remote Access VPN, hence this license is required to manage the suite

C.

EndpointContainerLicense ° The Endpoint Software Blade Licenses does not require an Endpoint Container License as the base

D.

IPSecVPNLicense • This license is installed on the VPN Gateway and is a basic requirement for a Remote Access VPN solution

Full Access
Question # 67

Which tool is used to enable ClusterXL?

A.

SmartUpdate

B.

cpconfig

C.

SmartConsole

D.

sysconfig

Full Access
Question # 68

Which of the following is NOT an alert option?

A.

SNMP

B.

High alert

C.

Mail

D.

User defined alert

Full Access
Question # 69

In Logging and Monitoring, the tracking options are Log, Detailed Log and Extended Log. Which of the following options can you add to each Log, Detailed Log and Extended Log?

A.

Accounting

B.

Suppression

C.

Accounting/Suppression

D.

Accounting/Extended

Full Access
Question # 70

NO: 219

What cloud-based SandBlast Mobile application is used to register new devices and users?

A.

Check Point Protect Application

B.

Management Dashboard

C.

Behavior Risk Engine

D.

Check Point Gateway

Full Access
Question # 71

Which Check Point software blade provides Application Security and identity control?

A.

Identity Awareness

B.

Data Loss Prevention

C.

URL Filtering

D.

Application Control

Full Access
Question # 72

You can access the ThreatCloud Repository from:

A.

R81.20 SmartConsole and Application Wiki

B.

Threat Prevention and Threat Tools

C.

Threat Wiki and Check Point Website

D.

R81.20 SmartConsole and Threat Prevention

Full Access
Go to page: