Checkpoint 156-315.81 - Check Point Certified Security Expert R81 Exam

Page:    1 / 69   
Total 344 questions

In order for changes made to policy to be enforced by a Security Gateway, what action must an administrator perform?

  • A. Publish changes
  • B. Save changes
  • C. Install policy
  • D. Install database


Answer : C

Name the file that is an electronically signed file used by Check Point to translate the features in the license into a code?

  • A. Both License (.lic) and Contract (.xml) files
  • B. cp.macro
  • C. Contract file (.xml)
  • D. license File (.lic)


Answer : B

Which two Identity Awareness daemons are used to support identity sharing?

  • A. Policy Activation Point (PAP) and Policy Decision Point (PDP)
  • B. Policy Manipulation Point (PMP) and Policy Activation Point (PAP)
  • C. Policy Enforcement Point (PEP) and Policy Manipulation Point (PMP)
  • D. Policy Decision Point (PDP) and Policy Enforcement Point (PEP)


Answer : D

In which scenario will an administrator need to manually define Proxy ARP?

  • A. When they configure an "Automatic Static NAT" which translates to an IP address that does not belong to one of the firewall’s interfaces.
  • B. When they configure an "Automatic Hide NAT" which translates to an IP address that does not belong to one of the firewall’s interfaces.
  • C. When they configure a "Manual Static NAT" which translates to an IP address that does not belong to one of the firewall’s interfaces.
  • D. When they configure a "Manual Hide NAT" which translates to an IP address that belongs to one of the firewall’s interfaces.


Answer : C

Rugged appliances are small appliances with ruggedized hardware and like Quantum Spark appliance they use which operating system?

  • A. Centos Linux
  • B. Gaia embedded.
  • C. Gaia
  • D. Red Hat Enterprise Linux version 5


Answer : B

Page:    1 / 69   
Total 344 questions