SmartEvent does NOT use which of the following procedures to identity events:
Answer(s): C
The procedure that SmartEvent does not use to identify events is matching a log against local exclusions. Local exclusions are used to filter out logs that are not relevant for SmartLog, not SmartEvent12. SmartEvent uses the other procedures to identify events based on event definitions, event candidates, and global exclusions3 .
SmartLog R81 Administration Guide, Check Point CCSA - R81: Practice Test & Explanation, SmartEvent R81 Administration Guide, [Free CheckPoint CCSA Sample Questions and Study Guide]
John is using Management H
Answer(s): B
The SmartCenter that should be connected to for making changes is the active SmartCenter. The active SmartCenter is the one that is currently synchronizing its configuration with the secondary SmartCenter and handling the communication with the gateways . The primary SmartCenter is the one that was initially configured as the main server, but it may become inactive if a failover occurs. The virtual IP of SmartCenter HA is used to access the SmartConsole, not to make changes.
[Security Management Server High Availability (HA) R81 Administration Guide], [Check Point CCSA - R81: Practice Test & Explanation], [How to configure ClusterXL High Availability on Security Management Server]
Which path below is available only when CoreXL is enabled?
The path that is available only when CoreXL is enabled is the medium path. The medium path is used to handle packets that require deeper inspection by the Firewall and IPS blades, but do not need to go through the slow path . The slow path is used to handle packets that require stateful or out-of- state inspection by other blades, such as Application Control or VPN . The firewall path and the accelerated path are available regardless of CoreXL status .
[CoreXL R81 Administration Guide], [Check Point CCSA - R81: Practice Test & Explanation], [Check Point Security Gateway Architecture and Packet Flow], [Free Check Point CCSA Sample Questions and Study Guide]
Which of the following describes how Threat Extraction functions?
Answer(s): D
Threat Extraction delivers PDF versions of original files with active content removed, such as macros, embedded objects, and scripts. This ensures that users receive clean and safe files in seconds12.
Check Point SandBlast Zero-Day Protection, Check Point Threat Extraction
Post your Comments and Discuss Checkpoint 156-215.81 exam with other Community members:
Pooja commented on September 08, 2024 Nice info ok I will do the same Anonymous upvote
IPR commented on October 05, 2023 q:124 is wrong - the correct answer is b but the syntax is: ip-address Anonymous upvote
IPR commented on October 05, 2023 Q:124 is wrong - the correct answer is B but the syntax is: ip-address Anonymous upvote