Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

156-315.81 Exam Dumps - Checkpoint CCSE R81 Questions and Answers

Question # 94

SmartEvent has several components that function together to track security threats. What is the function of the Correlation Unit as a component of this architecture?

Options:

A.

Analyzes each log entry as it arrives at the log server according to the Event Policy. When a threat pattern is identified, an event is forwarded to the SmartEvent Server.

B.

Correlates all the identified threats with the consolidation policy.

C.

Collects syslog data from third party devices and saves them to the database.

D.

Connects with the SmartEvent Client when generating threat reports.

Buy Now
Question # 95

What is the main difference between Threat Extraction and Threat Emulation?

Options:

A.

Threat Emulation never delivers a file and takes more than 3 minutes to complete.

B.

Threat Extraction always delivers a file and takes less than a second to complete.

C.

Threat Emulation never delivers a file that takes less than a second to complete.

D.

Threat Extraction never delivers a file and takes more than 3 minutes to complete.

Buy Now
Question # 96

Customer’s R81 management server needs to be upgraded to R81.20. What is the best upgrade method when the management server is not connected to the Internet?

Options:

A.

Export R81 configuration, clean install R81.20 and import the configuration

B.

CPUSE offline upgrade

C.

CPUSE online upgrade

D.

SmartUpdate upgrade

Buy Now
Question # 97

Using Threat Emulation technologies, what is the best way to block .exe and .bat file types?

Options:

A.

enable DLP and select.exe and .bat file type

B.

enable .exe & .bat protection in IPS Policy

C.

create FW rule for particular protocol

D.

tecli advanced attributes set prohibited_file_types exe.bat

Buy Now
Question # 98

For Management High Availability, which of the following is NOT a valid synchronization status?

Options:

A.

Collision

B.

Down

C.

Lagging

D.

Never been synchronized

Buy Now
Question # 99

As a valid Mobile Access Method, what feature provides Capsule Connect/VPN?

Options:

A.

That is used to deploy the mobile device as a generator of one-time passwords for authenticating to an RSA Authentication Manager.

B.

Fill Layer4 VPN –SSL VPN that gives users network access to all mobile applications.

C.

Full Layer3 VPN –IPSec VPN that gives users network access to all mobile applications.

D.

You can make sure that documents are sent to the intended recipients only.

Buy Now
Question # 100

The Correlation Unit performs all but the following actions:

Options:

A.

Marks logs that individually are not events, but may be part of a larger pattern to be identified later.

B.

Generates an event based on the Event policy.

C.

Assigns a severity level to the event.

D.

Takes a new log entry that is part of a group of items that together make up an event, and adds it to an ongoing event.

Buy Now
Question # 101

As an administrator, you may be required to add the company logo to reports. To do this, you would save the logo as a PNG file with the name ‘cover-company-logo.png’ and then copy that image file to which directory on the SmartEvent server?

Options:

A.

SFWDIR/smartevent/conf

B.

$RTDIR/smartevent/conf

C.

$RTDIR/smartview/conf

D.

$FWDIR/smartview/conf

Buy Now
Question # 102

Which Check Point daemon monitors the other daemons?

Options:

A.

fwm

B.

cpd

C.

cpwd

D.

fwssd

Buy Now
Question # 103

What processes does CPM control?

Options:

A.

Object-Store, Database changes, CPM Process and web-services

B.

web-services, CPMI process, DLEserver, CPM process

C.

DLEServer, Object-Store, CP Process and database changes

D.

web_services, dle_server and object_Store

Buy Now
Question # 104

In Advanced Permanent Tunnel Configuration, to set the amount of time the tunnel test runs without a

response before the peer host is declared ‘down’, you would set the_________?

Options:

A.

life sign polling interval

B.

life sign timeout

C.

life_sign_polling_interval

D.

life_sign_timeout

Buy Now
Question # 105

SandBlast has several functional components that work together to ensure that attacks are prevented in real-time. Which the following is NOT part of the SandBlast component?

Options:

A.

Threat Emulation

B.

Mobile Access

C.

Mail Transfer Agent

D.

Threat Cloud

Buy Now
Question # 106

What order should be used when upgrading a Management High Availability Cluster?

Options:

A.

Secondary Management, then Primary Management

B.

Active Management, then Standby Management

C.

Standby Management, then Active Management

D.

Primary Management, then Secondary Management

Buy Now
Question # 107

Which of these is an implicit MEP option?

Options:

A.

Primary-backup

B.

Source address based

C.

Round robin

D.

Load Sharing

Buy Now
Question # 108

Which one of the following is true about Threat Extraction?

Options:

A.

Always delivers a file to user

B.

Works on all MS Office, Executables, and PDF files

C.

Can take up to 3 minutes to complete

D.

Delivers file only if no threats found

Buy Now
Exam Code: 156-315.81
Exam Name: Check Point Certified Security Expert R81.20
Last Update: Feb 22, 2025
Questions: 628
156-315.81 pdf

156-315.81 PDF

$25.5  $84.99
156-315.81 Engine

156-315.81 Testing Engine

$28.5  $94.99
156-315.81 PDF + Engine

156-315.81 PDF + Testing Engine

$40.5  $134.99