Free 156-315.81 Exam Braindumps (page: 18)

Page 18 of 158

What has to be taken into consideration when configuring Management HA?

  1. The Database revisions will not be synchronized between the management servers
  2. SmartConsole must be closed prior to synchronized changes in the objects database
  3. If you wanted to use Full Connectivity Upgrade, you must change the Implied Rules to allow FW1_cpredundant to pass before the Firewall Control Connections.
  4. For Management Server synchronization, only External Virtual Switches are supported. So, if you wanted to employ Virtual Routers instead, you have to reconsider your design.

Answer(s): A

Explanation:

When configuring Management HA, you have to take into consideration that the Database revisions will not be synchronized between the management servers. Database revisions are snapshots of the database that are created manually or automatically when installing a policy or saving changes. They are stored locally on each management server and are not replicated by Management HA. The other options are either not true or not relevant to Management HA.


Reference:

Check Point R81 Installation and Upgrade Guide



What is the difference between an event and a log?

  1. Events are generated at gateway according to Event Policy
  2. A log entry becomes an event when it matches any rule defined in Event Policy
  3. Events are collected with SmartWorkflow form Trouble Ticket systems
  4. Log and Events are synonyms

Answer(s): B

Explanation:

The difference between an event and a log is that a log entry becomes an event when it matches any rule defined in Event Policy. A log entry is a record of a network activity that is generated by a Security Gateway or a Management Server. An event is a log entry that meets certain criteria and triggers an action or a notification. The other options are either not true or not accurate definitions of events and logs.


Reference:

Check Point R81 Logging and Monitoring Administration Guide



What are the attributes that SecureXL will check after the connection is allowed by Security Policy?

  1. Source address, Destination address, Source port, Destination port, Protocol
  2. Source MAC address, Destination MAC address, Source port, Destination port, Protocol
  3. Source address, Destination address, Source port, Destination port
  4. Source address, Destination address, Destination port, Protocol

Answer(s): A

Explanation:

The attributes that SecureXL will check after the connection is allowed by Security Policy are Source address, Destination address, Source port, Destination port, Protocol. These are the five tuple parameters that define a connection and are used by SecureXL to accelerate the traffic. The other options are either missing some of the parameters or include irrelevant ones, such as MAC addresses1.


Reference:

Check Point R81 SecureXL Administration Guide



Which statement is NOT TRUE about Delta synchronization?

  1. Using UDP Multicast or Broadcast on port 8161
  2. Using UDP Multicast or Broadcast on port 8116
  3. Quicker than Full sync
  4. Transfers changes in the Kernel tables between cluster members.

Answer(s): A

Explanation:

The statement that is not true about Delta synchronization is Using UDP Multicast or Broadcast on port 8161. Delta synchronization is a mechanism that transfers only the changes in the kernel tables between cluster members, instead of sending the entire tables. It uses UDP Multicast or Broadcast on port 8116, not 81612. The other statements are true about Delta synchronization.


Reference:

Check Point R81 ClusterXL Administration Guide



Page 18 of 158



Post your Comments and Discuss Checkpoint 156-315.81 exam with other Community members:

Fon commented on January 05, 2024
Q40 is wrong, correct reponse is 'Accept' template is enabled by default in R81.20
AUSTRALIA
upvote

Gavin commented on August 24, 2023
Question76 is wrong, Manual NAT ALWAYS comes first
Anonymous
upvote

stephane T commented on July 29, 2023
very usefull
CAMEROON
upvote