Free 156-315.81 Exam Braindumps (page: 12)

Page 12 of 158

In a Client to Server scenario, which inspection point is the first point immediately following the tables and rule base check of a packet coming from outside of the network?

  1. Big l
  2. Little o
  3. Little i
  4. Big O

Answer(s): A

Explanation:

The inspection point Big l is the first point immediately following the tables and rule base check of a packet coming from outside of the network. It is also the last point before the packet leaves the Security Gateway to the internal network1. The other inspection points are either before or after the rule base check, or in a different direction of traffic flow2.


Reference:

Check Point R81 Security Gateway Architecture and Packet Flow, 156-315.81 Checkpoint Exam Info and Free Practice Test - ExamTopics



What is the mechanism behind Threat Extraction?

  1. This a new mechanism which extracts malicious files from a document to use it as a counter-attack against its sender.
  2. This is a new mechanism which is able to collect malicious files out of any kind of file types to destroy it prior to sending it to the intended recipient.
  3. This is a new mechanism to identify the IP address of the sender of malicious codes and put it into the SAM database (Suspicious Activity Monitoring).
  4. Any active contents of a document, such as JavaScripts, macros and links will be removed from the document and forwarded to the intended recipient, which makes this solution very fast.

Answer(s): D

Explanation:

Threat Extraction is a technology that removes potentially malicious features that are known to be risky from files (macros, embedded objects and more), rather than determining their maliciousness. By cleaning the file before it enters the organization, Threat Extraction preemptively prevents both known and unknown threats, providing better protection against zero-day attacks1. Any active contents of a document, such as JavaScripts, macros and links will be removed from the document and forwarded to the intended recipient, which makes this solution very fast2. The other options are either incorrect or irrelevant to the mechanism behind Threat Extraction.


Reference:

Threat Extraction (CDR) - Check Point Software, Check Point Document Threat Extraction Technology



You want to gather and analyze threats to your mobile device. It has to be a lightweight app.
Which application would you use?

  1. SmartEvent Client Info
  2. SecuRemote
  3. Check Point Protect
  4. Check Point Capsule Cloud

Answer(s): C

Explanation:

Check Point Protect is a lightweight app that can be used to gather and analyze threats to your mobile device. It provides real-time threat intelligence, device posture assessment, and secure browsing protection3. The other applications are either not designed for mobile devices, or do not offer threat analysis features.


Reference:

R81 CCSA & CCSE exams released featuring Promo for... -

Check Point ..., Check Point Protect - Apps on Google Play



Which view is NOT a valid CPVIEW view?

  1. IDA
  2. RAD
  3. PDP
  4. VPN

Answer(s): C

Explanation:

PDP is not a valid CPVIEW view. CPVIEW is a command-line tool that shows the status of different system parameters, such as CPU, memory, disk, network, and firewall. The valid views are IDA, RAD, VPN, FW, QoS, and others. PDP is a process that handles identity awareness and authentication.


Reference:

Check Point R81 Gaia Administration Guide, Check Point Identity Awareness Administration Guide R81



Page 12 of 158



Post your Comments and Discuss Checkpoint 156-315.81 exam with other Community members:

Fon commented on January 05, 2024
Q40 is wrong, correct reponse is 'Accept' template is enabled by default in R81.20
AUSTRALIA
upvote

Gavin commented on August 24, 2023
Question76 is wrong, Manual NAT ALWAYS comes first
Anonymous
upvote

stephane T commented on July 29, 2023
very usefull
CAMEROON
upvote