Certbus > CheckPoint > CCSE > 156-315.81 > 156-315.81 Online Practice Questions and Answers

156-315.81 Online Practice Questions and Answers

Questions 4

Where you can see and search records of action done by R81 SmartConsole administrators?

A. In SmartView Tracker, open active log

B. In the Logs and Monitor view, select "Open Audit Log View"

C. In SmartAuditLog View

D. In Smartlog, all logs

Browse 570 Q&As
Questions 5

The Firewall Administrator is required to create 100 new host objects with different IP addresses. What API command can he use in the script to achieve the requirement?

A. add host name ip-address

B. add hostname ip-address

C. set host name ip-address

D. set hostname ip-address

Browse 570 Q&As
Questions 6

fwssd is a child process of which of the following Check Point daemons?

A. fwd

B. cpwd

C. fwm

D. cpd

Browse 570 Q&As
Questions 7

You are investigating issues with to gateway cluster members are not able to establish the first initial cluster synchronization. What service is used by the FWD daemon to do a Full Synchronization?

A. TCP port 443

B. TCP port 257

C. TCP port 256

D. UDP port 8116

Browse 570 Q&As
Questions 8

Using mgmt_cli, what is the correct syntax to import a host object called Server_1 from the CLI?

A. mgmt_cli add-host "Server_1" ip_address "10.15.123.10" --format txt

B. mgmt_cli add host name "Server_1" ip-address "10.15.123.10" --format json

C. mgmt_cli add object-host "Server_1" ip-address "10.15.123.10" --format json

D. mgmt._cli add object "Server-1" ip-address "10.15.123.10" --format json

Browse 570 Q&As
Questions 9

In the Firewall chain mode FFF refers to:

A. Stateful Packets

B. No Match

C. All Packets

D. Stateless Packets

Browse 570 Q&As
Questions 10

What is UserCheck?

A. Messaging tool used to verify a user's credentials.

B. Communication tool used to inform a user about a website or application they are trying to access.

C. Administrator tool used to monitor users on their network.

D. Communication tool used to notify an administrator when a new user is created.

Browse 570 Q&As
Questions 11

When performing a minimal effort upgrade, what will happen to the network traffic?

A. All connections that were Initiated before the upgrade will be dropped, causing network downtime.

B. All connections that were initiated before the upgrade will be handled by the active gateway

C. All connections that were initiated before the upgrade will be handled normally

D. All connections that were initiated before the upgrade will be handled by the standby gateway

Browse 570 Q&As
Questions 12

Which command is used to obtain the configuration lock in Gaia?

A. Lock database override

B. Unlock database override

C. Unlock database lock

D. Lock database user

Browse 570 Q&As
Questions 13

You have enabled "Full Log" as a tracking option to a security rule. However, you are still not seeing any data type information. What is the MOST likely reason?

A. Logging has disk space issues. Change logging storage options on the logging server or Security Management Server properties and install database.

B. Data Awareness is not enabled.

C. Identity Awareness is not enabled.

D. Logs are arriving from Pre-R81 gateways.

Browse 570 Q&As
Questions 14

True or False: In a Distributed Environment, a Central License can be installed via CLI on a Security Gateway.

A. True, CLI is the prefer method for Licensing

B. False, Central License are handled via Security Management Server

C. False, Central Licenses are installed via Gaia on Security Gateways

D. True, Central License can be installed with CPLIC command on a Security Gateway

Browse 570 Q&As
Questions 15

What is the command used to activated Multi-Version Cluster mode?

A. set cluster member mvc on in Clish

B. set mvc on on Clish

C. set cluster MVC on in Expert Mode

D. set cluster mvc on in Expert Mode

Browse 570 Q&As
Questions 16

What is the valid range for Virtual Router Identifier (VRID) value in a Virtual Routing Redundancy Protocol (VRRP) configuration?

A. 1-254

B. 1-255

C. 0-254

D. 0 ?255

Browse 570 Q&As
Questions 17

Bob has finished io setup provisioning a secondary security management server. Now he wants to check if the provisioning has been correct. Which of the following Check Point command can be used to check if the security management server has been installed as a primary or a secondary security management server?

A. cpprod_util MgmtlsPrimary

B. cpprod_util FwlsSecondary

C. cpprod_util MgmtlsSecondary

D. cpprod_util FwlsPrimary

Browse 570 Q&As
Questions 18

What is the command switch to specify the Gaia API context?

A. You have to specify it in the YAML file api.yml which is located underneath the /etc directory of the security management server

B. You have to change to the zsh-Shell which defaults to the Gaia API context.

C. No need to specify a context, since it defaults to the Gaia API context.

D. mgmt_cli --context gaia_api

Browse 570 Q&As
Exam Code: 156-315.81
Exam Name: Check Point Certified Security Expert R81
Last Update: Apr 25, 2024
Questions: 570 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99