Go Back on 156-315.81 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

156-315.81 Practice Test


Page 4 out of 85 Pages

What is not a component of Check Point SandBlast?


A. Threat Emulation


B. Threat Simulator


C. Threat Extraction


D. Threat Cloud





B.
  Threat Simulator

Explanation: Threat Simulator is not a component of Check Point SandBlast. Check Point SandBlast is a solution that provides advanced protection against zero-day threats using four components: Threat Emulation, Threat Extraction, Threat Cloud, and Threat Prevention. References: Check Point SandBlast Network

Automatic affinity means that if SecureXL is running, the affinity for each interface is automatically reset every


A. 15 sec


B. 60 sec


C. 5 sec


D. 30 sec





B.
  60 sec

Explanation: Automatic affinity means that if SecureXL is running, the affinity for each interface is automatically reset every 60 seconds based on the current traffic load. This ensures optimal performance and load balancing of SecureXL instances. References: SecureXL Mechanism

With SecureXL enabled, accelerated packets will pass through the following:


A. Network Interface Card, OSI Network Layer, OS IP Stack, and the Acceleration Device


B. Network Interface Card, Check Point Firewall Kernal, and the Acceleration Device


C. Network Interface Card and the Acceleration Device


D. Network Interface Card, OSI Network Layer, and the Acceleration Device





C.
  Network Interface Card and the Acceleration Device

Explanation: With SecureXL enabled, accelerated packets will pass through the following: Network Interface Card and the Acceleration Device. SecureXL is a technology that accelerates network traffic processing by offloading intensive operations from the Firewall kernel to a dedicated SecureXL device. Accelerated packets are packets that match certain criteria and can be handled by SecureXL without involving the Firewall kernel. These packets bypass the OSI Network Layer, OS IP Stack, and Check Point Firewall Kernel, and are processed directly by the Network Interface Card and the Acceleration Device. The other options are either incorrect or describe non-accelerated packets.

Which is not a blade option when configuring SmartEvent?


A. Correlation Unit


B. SmartEvent Unit


C. SmartEvent Server


D. Log Server





B.
  SmartEvent Unit

Explanation: SmartEvent Unit is not a blade option when configuring SmartEvent. SmartEvent is a unified security event management solution that provides visibility, analysis, and reporting of security events across multiple Check Point products. SmartEvent consists of three main components: SmartEvent Server, Correlation Unit, and Log Server. SmartEvent Server is responsible for storing and displaying security events in SmartConsole and SmartEventWeb. Correlation Unit is responsible for collecting and correlating logs from various sources and generating security events based on predefined or custom scenarios. Log Server is responsible for receiving and indexing logs from Security Gateways and other Check Point modules. SmartEvent Unit is not a valid component or blade of SmartEvent.

In R81 spoofing is defined as a method of:


A. Disguising an illegal IP address behind an authorized IP address through Port Address Translation.


B. Hiding your firewall from unauthorized users.


C. Detecting people using false or wrong authentication logins


D. Making packets appear as if they come from an authorized IP address.





D.
  Making packets appear as if they come from an authorized IP address.

Explanation: In R81, spoofing is defined as a method of making packets appear as if they come from an authorized IP address. Spoofing can be used by attackers to bypass security policies or hide their identity. Check Point firewalls use anti-spoofing mechanisms to prevent spoofed packets from entering or leaving the network.


Page 4 out of 85 Pages
Previous