Free 156-215.81 Exam Braindumps (page: 5)

Page 5 of 102

Session unique identifiers are passed to the web api using which http header option?

  1. X-chkp-sid
  2. Accept-Charset
  3. Proxy-Authorization
  4. Application

Answer(s): A

Explanation:

The correct answer is A because session unique identifiers are passed to the web api using the X- chkp-sid http header option1. The X-chkp-sid header is used to authenticate and authorize API calls1.

The other options are not related to session unique identifiers.


Reference:

Check Point R81 Security Management Administration Guide



What is the main difference between Threat Extraction and Threat Emulation?

  1. Threat Emulation never delivers a file and takes more than 3 minutes to complete
  2. Threat Extraction always delivers a file and takes less than a second to complete
  3. Threat Emulation never delivers a file that takes less than a second to complete
  4. Threat Extraction never delivers a file and takes more than 3 minutes to complete

Answer(s): B

Explanation:

The correct answer is B because Threat Extraction always delivers a file and takes less than a second to complete2. Threat Extraction removes exploitable content from files and delivers a clean and safe file to the user2. Threat Emulation analyzes files in a sandbox environment and delivers a verdict of malicious or benign2. Threat Emulation can take more than 3 minutes to complete depending on the file size and complexity2.


Reference:

Check Point R81 Threat Prevention Administration Guide



Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?

  1. Detects and blocks malware by correlating multiple detection engines before users are affected.
  2. Configure rules to limit the available network bandwidth for specified users or groups.
  3. Use UserCheck to help users understand that certain websites are against the company's security policy.
  4. Make rules to allow or block applications and Internet sites for individual applications, categories, and risk levels.

Answer(s): A

Explanation:

The correct answer is A because detecting and blocking malware by correlating multiple detection engines before users are affected is not a feature of the Check Point URL Filtering and Application Control Blade3. This feature is part of the Check Point Anti-Virus and Anti-Bot Blades3. The other options are features of the Check Point URL Filtering and Application Control Blade3.


Reference:

Check Point R81 URL Filtering and Application Control Administration Guide



You want to store the GAiA configuration in a file for later reference.
What command should you use?

  1. write mem <filename>
  2. show config -f <filename>
  3. save config -o <filename>
  4. save configuration <filename>

Answer(s): D

Explanation:

The correct answer is D because the command save configuration <filename> stores the Gaia configuration in a file for later reference1. The other commands are not valid in Gaia Clish1.


Reference:

Gaia R81.10 Administration Guide



Page 5 of 102



Post your Comments and Discuss Checkpoint 156-215.81 exam with other Community members:

Pooja commented on September 08, 2024
Nice info ok I will do the same
Anonymous
upvote

IPR commented on October 05, 2023
q:124 is wrong - the correct answer is b but the syntax is: ip-address
Anonymous
upvote

IPR commented on October 05, 2023
Q:124 is wrong - the correct answer is B but the syntax is: ip-address
Anonymous
upvote