Free 156-315.81 Exam Braindumps (page: 14)

Page 14 of 158

If you needed the Multicast MAC address of a cluster, what command would you run?

  1. cphaprob ­a if
  2. cphaconf ccp multicast
  3. cphaconf debug data
  4. cphaprob igmp

Answer(s): D

Explanation:

The command cphaprob igmp can be used to display the Multicast MAC address of a cluster. This command shows the IGMP (Internet Group Management Protocol) information for each cluster interface, including the VRID (Virtual Router ID), the Multicast IP address, and the Multicast MAC address3. The other commands do not show the Multicast MAC address information.


Reference:

Check Point R81 ClusterXL Administration Guide



Which is NOT an example of a Check Point API?

  1. Gateway API
  2. Management API
  3. OPSC SDK
  4. Threat Prevention API

Answer(s): A

Explanation:

Gateway API is not an example of a Check Point API. Check Point APIs are interfaces that enable interactions with Check Point products using automation scripts or external applications. The examples of Check Point APIs are Management API, OPSEC SDK, Threat Prevention API, Identity Awareness Web Services API, and others4. Gateway API is not a valid Check Point API name.


Reference:

Check Point R81 Security Management Administration Guide, Check Point APIs



What are the three components for Check Point Capsule?

  1. Capsule Docs, Capsule Cloud, Capsule Connect
  2. Capsule Workspace, Capsule Cloud, Capsule Connect
  3. Capsule Workspace, Capsule Docs, Capsule Connect
  4. Capsule Workspace, Capsule Docs, Capsule Cloud

Answer(s): D

Explanation:

The three components for Check Point Capsule are Capsule Workspace, Capsule Docs, and Capsule Cloud. Capsule Workspace is a secure container app that allows users to access corporate data and applications from their mobile devices. Capsule Docs is a solution that protects documents with encryption and granular access control. Capsule Cloud is a cloud-based security service that enforces security policies on devices that are outside the corporate network.


Reference:

Check Point Capsule



Which of the following Check Point processes within the Security Management Server is responsible for the receiving of log records from Security Gateway?

  1. logd
  2. fwd
  3. fwm
  4. cpd

Answer(s): B

Explanation:

The fwd process within the Security Management Server is responsible for the receiving of log records from Security Gateway. The fwd process handles the communication with the Security Gateways and log servers via TCP port 2571. The other processes have different roles, such as logd for writing logs to the database, fwm for handling GUI clients, and cpd for infrastructure tasks2.


Reference:

Check Point Ports Used for Communication by Various Check Point Modules, Check Point Processes Cheat Sheet ­ LazyAdmins



Page 14 of 158



Post your Comments and Discuss Checkpoint 156-315.81 exam with other Community members:

Fon commented on January 05, 2024
Q40 is wrong, correct reponse is 'Accept' template is enabled by default in R81.20
AUSTRALIA
upvote

Gavin commented on August 24, 2023
Question76 is wrong, Manual NAT ALWAYS comes first
Anonymous
upvote

stephane T commented on July 29, 2023
very usefull
CAMEROON
upvote