Check Point 156-315.81.20 Practice Exams
Last updated on Apr 02,2025- Exam Code: 156-315.81.20
- Exam Name: Check Point Certified Security Expert - R81.20
- Certification Provider: Check Point
- Latest update: Apr 02,2025
Which command lists all tables in Gaia?
- A . fw tab Ct
- B . fw tab Clist
- C . fw-tab Cs
- D . fw tab -1
SandBlast Mobile identifies threats in mobile devices by using on-device, network, and cloud-based algorithms and has four dedicated components that constantly work together to protect mobile devices and their data.
Which component is NOT part of the SandBlast Mobile solution?
- A . Management Dashboard
- B . Gateway
- C . Personal User Storage
- D . Behavior Risk Engine
If you needed the Multicast MAC address of a cluster, what command would you run?
- A . cphaprob Ca if
- B . cphaconf ccp multicast
- C . cphaconf debug data
- D . cphaprob igmp
Check Pont Central Deployment Tool (CDT) communicates with the Security Gateway / Cluster Members over Check Point SIC _______.
- A . TCP Port 18190
- B . TCP Port 18209
- C . TCP Port 19009
- D . TCP Port 18191
When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?
- A . None, Security Management Server would be installed by itself.
- B . SmartConsole
- C . SecureClient
- D . Security Gateway
- E . SmartEvent
What is the difference between an event and a log?
- A . Events are generated at gateway according to Event Policy
- B . A log entry becomes an event when it matches any rule defined in Event Policy
- C . Events are collected with SmartWorkflow form Trouble Ticket systems
- D . Log and Events are synonyms
Identify the API that is not supported by Check Point currently.
- A . R81 Management API-
- B . Identity Awareness Web Services API
- C . Open REST API
- D . OPSEC SDK
Fill in the blank: The R81 feature _____ permits blocking specific IP addresses for a specified time period.
- A . Block Port Overflow
- B . Local Interface Spoofing
- C . Suspicious Activity Monitoring
- D . Adaptive Threat Prevention
What is the limitation of employing Sticky Decision Function?
- A . With SDF enabled, the involved VPN Gateways only supports IKEv1
- B . Acceleration technologies, such as SecureXL and CoreXL are disabled when activating SDF
- C . With SDF enabled, only ClusterXL in legacy mode is supported
- D . With SDF enabled, you can only have three Sync interfaces at most
Session unique identifiers are passed to the web api using which http header option?
- A . X-chkp-sid
- B . Accept-Charset
- C . Proxy-Authorization
- D . Application