Free Checkpoint 156-315.80 Exam Braindumps (page: 13)

In a Client to Server scenario, which inspection point is the first point immediately following the tables and rule base check of a packet coming from outside of the network?

  1. Big l
  2. Little o
  3. Little i
  4. Big O

Answer(s): A



What is the mechanism behind Threat Extraction?

  1. This a new mechanism which extracts malicious files from a document to use it as a counter-attack against its sender.
  2. This is a new mechanism which is able to collect malicious files out of any kind of file types to destroy it prior to sending it to the intended recipient.
  3. This is a new mechanism to identify the IP address of the sender of malicious codes and put it into the SAM database (Suspicious Activity Monitoring).
  4. Any active contents of a document, such as JavaScripts, macros and links will be removed from the document and forwarded to the intended recipient, which makes this solution very fast.

Answer(s): D



You want to gather and analyze threats to your mobile device. It has to be a lightweight app.
Which application would you use?

  1. SmartEvent Client Info
  2. SecuRemote
  3. Check Point Protect
  4. Check Point Capsule Cloud

Answer(s): C



Which view is NOT a valid CPVIEW view?

  1. IDA
  2. RAD
  3. PDP
  4. VPN

Answer(s): C



Viewing page 13 of 117
Viewing questions 49 - 52 out of 479 questions



Post your Comments and Discuss Checkpoint 156-315.80 exam prep with other Community members:

156-315.80 Exam Discussions & Posts