Discount Offer
Go Back on 156-315.81 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99



Pass exam with Dumps4free or we will provide you with three additional months of access for FREE.

156-315.81 Practice Test


Page 29 out of 85 Pages

nefit of “tw monitor” over “tcpdump


A. “fw monitor” reveals Layer 2 information, while “tcpdump” acts at Layer 3.


B. fw monitor” is also available for 64-Bit operating systems.


C. With “fw monitor”, you can see the inspection points, which cannot be seen in “tcpdump”


D. “fw monitor” can be used from the CLI of the Management Server to collect information from multiple gateways.





C.
  With “fw monitor”, you can see the inspection points, which cannot be seen in “tcpdump”

Explanation: The benefit of fw monitor over tcpdump is that with fw monitor, you can see the inspection points, which cannot be seen in tcpdump. Inspection points are the locations in the firewall kernel where packets are inspected by the security policy and other software blades. Fw monitor allows you to capture packets at different inspection points and see how they are processed by the firewall. Tcpdump, on the other hand, is a generic packet capture tool that only shows the packets as they enter or leave the network interface. References: Check Point Security Expert R81 Course, fw monitor, tcpdump

To accelerate the rate of connection establishment, SecureXL groups all connection that match a particular service and whose sole differentiating element is the source port. The type of grouping enables even the very first packets of a TCP handshake to be accelerated. The first packets of the first connection on the same service will be forwarded to the Firewall kernel which will then create a template of the connection. Which of the these is NOT a SecureXL template?


A. Accept Template


B. Deny Template


C. Drop Template


D. NAT Template





B.
  Deny Template

SandBlast appliances can be deployed in the following modes:


A. using a SPAN port to receive a copy of the traffic only


B. detect only


C. inline/prevent or detect


D. as a Mail Transfer Agent and as part of the traffic flow only





C.
  inline/prevent or detect

VPN Link Selection will perform the following when the primary VPN link goes down?


A. The Firewall will drop the packets.


B. The Firewall can update the Link Selection entries to start using a different link for the same tunnel.


C. The Firewall will send out the packet on all interfaces.


D. The Firewall will inform the client that the tunnel is down.





B.
  The Firewall can update the Link Selection entries to start using a different link for the same tunnel.

What is the name of the secure application for Mail/Calendar for mobile devices?


A. Capsule Workspace


B. Capsule Mail


C. Capsule VPN


D. Secure Workspace





A.
  Capsule Workspace


Page 29 out of 85 Pages
Previous