Go Back on 156-315.81 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

156-315.81 Practice Test


Page 17 out of 85 Pages

What Is the difference between Updatable Objects and Dynamic Objects


A. Dynamic Objects ate maintained automatically by the Threat Cloud. Updatable Objects are created and maintained locally. In both cases there is no need to install policy for the changes to take effect.


B. Updatable Objects is a Threat Cloud Service. The provided Objects are updated automatically. Dynamic Objects are created and maintained locally For Dynamic Objects there is no need to install policy for the changes to take effect.


C. Updatable Objects is a Threat Cloud Service. The provided Objects are updated automatically. Dynamic Objects are created and maintained locally In both cases there is no need to install policy for the changes to take effect.


D. Dynamic Objects are maintained automatically by the Threat Cloud. For Dynamic Objects there rs no need to install policy for the changes to take effect. Updatable Objects are created and maintained locally.





B.
  Updatable Objects is a Threat Cloud Service. The provided Objects are updated automatically. Dynamic Objects are created and maintained locally For Dynamic Objects there is no need to install policy for the changes to take effect.

Explanation: Updatable Objects are a Threat Cloud Service that provides network objects that represent external services, such as Office 365, AWS, GEO locations, and more. These objects are updated automatically by Check Point and do not require policy installation for the changes to take effect. Dynamic Objects are created and maintained locally by the administrator and can be used to define temporary or changing network objects, such as IP addresses, ports, or ranges. Dynamic Objects also do not require policy installation for the changes to take effect. References: Updatable Objects, Updateable Objects and NAT, R80.20 Updatable Domain Objects and CLI Commands.

What are possible Automatic Reactions in SmartEvent?


A. Mail. SNMP Trap, Block Source. Block Event Activity, External Script


B. Web Mail. Block Destination, SNMP Trap. SmartTask


C. Web Mail, Block Service. SNMP Trap. SmartTask, Geo Protection


D. Web Mail, Forward to SandBlast Appliance, SNMP Trap, External Script





A.
  Mail. SNMP Trap, Block Source. Block Event Activity, External Script

Which Check Point daemon invokes and monitors critical processes and attempts to restart them if they fail?


A. fwm


B. cpd


C. cpwd


D. cpm





C.
  cpwd

Explanation: The Check Point WatchDog daemon (cpwd) invokes and monitors critical processes and attempts to restart them if they fail. The cpwd daemon is responsible for starting processes such as cpd, cpm, fwm, fwd, and others. The cpd daemon is the Check Point Management daemon that handles communication between SmartConsole applications and Security Management Servers. The cpm daemon is the Check Point Management Server daemon that handles database operations and policy installation. The fwm daemon is the Firewall Management daemon that handles communication between Security Gateways and Security Management Servers. References: : Check Point Software, Getting Started, WatchDog Daemon; : Check Point Software, Getting Started, Processes.

Fill in the blank: The IPS policy for pre-R81 gateways is installed during the _______ .


A. Firewall policy install


B. Threat Prevention policy install


C. Anti-bot policy install


D. Access Control policy install





C.
  Anti-bot policy install

The customer has about 150 remote access user with a Windows laptops. Not more than 50 Clients will be connected at the same time. The customer want to use multiple VPN Gateways as entry point and a personal firewall. What will be the best license for him?


A. He will need Capsule Connect using MEP (multiple entry points).


B. Because the customer uses only Windows clients SecuRemote will be sufficient and no additional license is needed


C. He will need Harmony Endpoint because of the personal firewall.


D. Mobile Access license because he needs only a 50 user license, license count is per concurrent user.





C.
  He will need Harmony Endpoint because of the personal firewall.

Explanation: Harmony Endpoint is a solution that provides comprehensive protection for endpoint devices against cyber threats. Harmony Endpoint includes a personal firewall that controls the network traffic to and from the endpoint device, based on predefined rules and policies. Harmony Endpoint also integrates with Check Point’s VPN solutions to provide secure remote access to corporate resources1. Therefore, the customer will need Harmony Endpoint because of the personal firewall requirement.


Page 17 out of 85 Pages
Previous