Free 156-315.81 Exam Braindumps (page: 15)

Page 15 of 158

The fwd process on the Security Gateway sends logs to the fwd process on the Management Server via which 2 processes?

  1. fwd via cpm
  2. fwm via fwd
  3. cpm via cpd
  4. fwd via cpd

Answer(s): A

Explanation:

The fwd process on the Security Gateway sends logs to the fwd process on the Management Server via the cpm process. The cpm process is the main management process that handles database operations, policy installation, and communication with GUI clients via TCP port 190093. The other options are either incorrect or irrelevant to the log flow.


Reference:

Certified Security Expert (CCSE) R81.20 Course Overview, Check Point Ports Used for Communication by Various Check Point Modules



You have successfully backed up Check Point configurations without the OS information.
What command would you use to restore this backup?

  1. restore_backup
  2. import backup
  3. cp_merge
  4. migrate import

Answer(s): D

Explanation:

The command migrate import can be used to restore a backup of Check Point configurations without the OS information. This command imports the configuration from a file that was created using the migrate export command, which backs up only the Check Point configuration and not the OS settings. The other commands are either not valid or not suitable for restoring a backup without the OS information.


Reference:

Check Point R81 Installation and Upgrade Guide



The Firewall Administrator is required to create 100 new host objects with different IP addresses.
What API command can he use in the script to achieve the requirement?

  1. add host name <New HostName> ip-address <ip address>
  2. add hostname <New HostName> ip-address <ip address>
  3. set host name <New HostName> ip-address <ip address>
  4. set hostname <New HostName> ip-address <ip address>

Answer(s): A

Explanation:

The API command add host name <New HostName> ip-address <ip address> can be used in a script to create 100 new host objects with different IP addresses. This command adds a new host object with the specified name and IP address to the database. The other commands are either not valid or not suitable for creating new host objects.


Reference:

Check Point - Management API reference



Tom has been tasked to install Check Point R81 in a distributed deployment. Before Tom installs the systems this way, how many machines will he need if he does NOT include a SmartConsole machine in his calculations?

  1. One machine, but it needs to be installed using SecurePlatform for compatibility purposes.
  2. One machine
  3. Two machines
  4. Three machines

Answer(s): C

Explanation:

Tom will need two machines to install Check Point R81 in a distributed deployment, if he does not include a SmartConsole machine in his calculations. A distributed deployment consists of a Security Management Server that manages one or more Security Gateways. Therefore, Tom will need one machine for the Security Management Server and another machine for the Security Gateway. The other options are either too few or too many machines for a distributed deployment.


Reference:

Check Point R81 Installation and Upgrade Guide



Page 15 of 158



Post your Comments and Discuss Checkpoint 156-315.81 exam with other Community members:

Fon commented on January 05, 2024
Q40 is wrong, correct reponse is 'Accept' template is enabled by default in R81.20
AUSTRALIA
upvote

Gavin commented on August 24, 2023
Question76 is wrong, Manual NAT ALWAYS comes first
Anonymous
upvote

stephane T commented on July 29, 2023
very usefull
CAMEROON
upvote