Check Point 156-315.81.20 Practice Exams
Last updated on Apr 04,2025- Exam Code: 156-315.81.20
- Exam Name: Check Point Certified Security Expert - R81.20
- Certification Provider: Check Point
- Latest update: Apr 04,2025
Check Point recommends configuring Disk Space Management parameters to delete old log entries when available disk space is less than or equal to?
- A . 50%
- B . 75%
- C . 80%
- D . 15%
The fwd process on the Security Gateway sends logs to the fwd process on the Management Server via which 2 processes?
- A . fwd via cpm
- B . fwm via fwd
- C . cpm via cpd
- D . fwd via cpd
How many images are included with Check Point TE appliance in Recommended Mode?
- A . 2(OS) images
- B . images are chosen by administrator during installation
- C . as many as licensed for
- D . the newest image
Fill in the blank: The tool _____ generates a R81 Security Gateway configuration report.
- A . infoCP
- B . infoview
- C . cpinfo
- D . fw cpinfo
Which method below is NOT one of the ways to communicate using the Management API’s?
- A . Typing API commands using the “mgmt_cli” command
- B . Typing API commands from a dialog box inside the SmartConsole GUI application
- C . Typing API commands using Gaia’s secure shell(clish)19+
- D . Sending API commands over an http connection using web-services
Which method below is NOT one of the ways to communicate using the Management API’s?
- A . Typing API commands using the “mgmt_cli” command
- B . Typing API commands from a dialog box inside the SmartConsole GUI application
- C . Typing API commands using Gaia’s secure shell(clish)19+
- D . Sending API commands over an http connection using web-services
Which two of these Check Point Protocols are used by SmartEvent Processes?
- A . ELA and CPD
- B . FWD and LEA
- C . FWD and CPLOG
- D . ELA and CPLOG
The Event List within the Event tab contains:
- A . a list of options available for running a query.
- B . the top events, destinations, sources, and users of the query results, either as a chart or in a tallied list.
- C . events generated by a query.
- D . the details of a selected event.
Which of the following authentication methods ARE NOT used for Mobile Access?
- A . RADIUS server
- B . Username and password (internal, LDAP)
- C . SecurID
- D . TACACS+
Which of the following Check Point processes within the Security Management Server is responsible for the receiving of log records from Security Gateway?
- A . logd
- B . fwd
- C . fwm
- D . cpd