How Capsule Connect and Capsule Workspace differ?
Answer(s): A
Capsule Connect provides a Layer 3 VPN that allows users to access corporate resources securely from their mobile devices2. Capsule Workspace provides a secure container on the mobile device that isolates business data and applications from personal data and applications3. Capsule Workspace also provides a desktop with usable applications such as email, calendar, contacts, documents, and web applications3.
Check Point Capsule Connect, Check Point Capsule Workspace
Which of the following is a new R80.10 Gateway feature that had not been available in R77.X and older?
Answer(s): D
Sub Policies are a new feature in R80.10 Gateway that allow creating and attaching sets of rules to specific rules in the main policy4. Sub Policies are useful for delegating permissions, managing large rule bases, and applying different inspection profiles4. The other options are not new features in R80.10 Gateway.
Check Point R80.10 Security Management Administration Guide
What are the three components for Check Point Capsule?
The three components for Check Point Capsule are Capsule Workspace, Capsule Docs, and Capsule Cloud123. Capsule Workspace provides a secure container on the mobile device that isolates business data and applications from personal data and applications2. Capsule Docs protects business documents everywhere they go with encryption and access control1. Capsule Cloud provides cloud- based security services to protect mobile users from threats3.
Check Point Capsule, Check Point Capsule Workspace, Mobile Secure Workspace with Capsule
Full synchronization between cluster members is handled by Firewall Kernel. Which port is used for this?
Answer(s): B
The port used for full synchronization between cluster members is TCP port 2654. This port is used by the Firewall Kernel to send and receive synchronization data, such as connection tables, NAT tables, and VPN keys4. UDP port 8116 is used by the Cluster Control Protocol (CCP) for internal communications between cluster members4.
How does the Cluster Control Protocol function in working and failure scenarios for gateway clusters?
What is true about the IPS-Blade?
In R80, IPS is managed by the Threat Prevention Policy567. The Threat Prevention Policy defines how to protect the network from malicious traffic using IPS, Anti-Bot, Anti-Virus, and Threat Emulation software blades5. The IPS layer in the Threat Prevention Policy allows configuring IPS protections and actions for different network segments5. The other options are not true about the IPS-Blade.
Check Point IPS Datasheet, Check Point IPS Software Blade, Quantum IntrusionPrevention System (IPS)
Post your Comments and Discuss Checkpoint 156-215.81 exam dumps with other Community members: