Free 156-315.80 Exam Braindumps (page: 13)

Page 12 of 103

In a Client to Server scenario, which represents that the packet has already checked against the tables and the Rule Base?

  1. Big l
  2. Little o
  3. Little i
  4. Big O

Answer(s): D



What is the mechanism behind Threat Extraction?

  1. This a new mechanism which extracts malicious files from a document to use it as a counter-attack against its sender.
  2. This is a new mechanism which is able to collect malicious files out of any kind of file types to destroy it prior to sending it to the intended recipient.
  3. This is a new mechanism to identify the IP address of the sender of malicious codes and put it into the SAM database (Suspicious Activity Monitoring).
  4. Any active contents of a document, such as JavaScripts, macros and links will be removed from the document and forwarded to the intended recipient, which makes this solution very fast.

Answer(s): D



You want to gather and analyze threats to your mobile device. It has to be a lightweight app. Which application would you use?

  1. SmartEvent Client Info
  2. SecuRemote
  3. Check Point Protect
  4. Check Point Capsule Cloud

Answer(s): C


Reference:

https://www.insight.com/content/dam/insight-web/en_US/pdfs/check-point/mobile-threat- prevention-behavioral-risk-analysis.pdf



Which view is NOT a valid CPVIEW view?

  1. IDA
  2. RAD
  3. PDP
  4. VPN

Answer(s): C






Post your Comments and Discuss Checkpoint 156-315.80 exam with other Community members:

156-315.80 Discussions & Posts