Free 156-215.81 Exam Braindumps (page: 3)

Page 3 of 102

Full synchronization between cluster members is handled by Firewall Kernel.
Which port is used for this?

  1. UDP port 265
  2. TCP port 265
  3. UDP port 256
  4. TCP port 256

Answer(s): B

Explanation:

The port used for full synchronization between cluster members is TCP port 2654. This port is used by the Firewall Kernel to send and receive synchronization data, such as connection tables, NAT tables, and VPN keys4. UDP port 8116 is used by the Cluster Control Protocol (CCP) for internal communications between cluster members4.


Reference:

How does the Cluster Control Protocol function in working and failure scenarios for gateway clusters?



What is true about the IPS-Blade?

  1. in R80, IPS is managed by the Threat Prevention Policy
  2. in R80, in the IPS Layer, the only three possible actions are Basic, Optimized and Strict
  3. in R80, IPS Exceptions cannot be attached to "all rules"
  4. in R80, the GeoPolicy Exceptions and the Threat Prevention Exceptions are the same

Answer(s): A

Explanation:

In R80, IPS is managed by the Threat Prevention Policy567. The Threat Prevention Policy defines how to protect the network from malicious traffic using IPS, Anti-Bot, Anti-Virus, and Threat Emulation software blades5. The IPS layer in the Threat Prevention Policy allows configuring IPS protections and actions for different network segments5. The other options are not true about the IPS-Blade.


Reference:

Check Point IPS Datasheet, Check Point IPS Software Blade, Quantum Intrusion Prevention System (IPS)



Due to high CPU workload on the Security Gateway, the security administrator decided to purchase a new multicore CPU to replace the existing single core CPU. After installation, is the administrator required to perform any additional tasks?

  1. Go to clash-Run cpstop | Run cpstart
  2. Go to clash-Run cpconfig | Configure CoreXL to make use of the additional Cores | Exit cpconfig | Reboot Security Gateway
  3. Administrator does not need to perform any task. Check Point will make use of the newly installed CPU and Cores
  4. Go to clash-Run cpconfig | Configure CoreXL to make use of the additional Cores | Exit cpconfig | Reboot Security Gateway | Install Security Policy

Answer(s): B

Explanation:

The correct answer is B because after installing a new multicore CPU, the administrator needs to configure CoreXL to make use of the additional cores and reboot the Security Gateway. Installing the Security Policy is not necessary because it does not affect the CoreXL configuration1.


Reference:

Check Point R81 Security Management Administration Guide



When installing a dedicated R80 SmartEvent server, what is the recommended size of the root partition?

  1. Any size
  2. Less than 20GB
  3. More than 10GB and less than 20 GB
  4. At least 20GB

Answer(s): D

Explanation:

The correct answer is D because the recommended size of the root partition for a dedicated R80 SmartEvent server is at least 20GB2. Any size, less than 20GB, or more than 10GB and less than 20GB are not sufficient for the SmartEvent server.


Reference:

Check Point R80.40 Installation and Upgrade Guide



Page 3 of 102



Post your Comments and Discuss Checkpoint 156-215.81 exam with other Community members:

Pooja commented on September 08, 2024
Nice info ok I will do the same
Anonymous
upvote

IPR commented on October 05, 2023
q:124 is wrong - the correct answer is b but the syntax is: ip-address
Anonymous
upvote

IPR commented on October 05, 2023
Q:124 is wrong - the correct answer is B but the syntax is: ip-address
Anonymous
upvote