Free 156-315.81 Exam Braindumps (page: 25)

Page 25 of 158

Which features are only supported with R81.20 Gateways but not R77.x?

  1. Access Control policy unifies the Firewall, Application Control & URL Filtering, Data Awareness, and Mobile Access Software Blade policies.
  2. Limits the upload and download throughput for streaming media in the company to 1 Gbps.
  3. The rule base can be built of layers, each containing a set of the security rules. Layers are inspected in the order in which they are defined, allowing control over the rule base flow and which security functionalities take precedence.
  4. Time object to a rule to make the rule active only during specified times.

Answer(s): C

Explanation:

The features that are only supported with R81.20 Gateways and not with R77.x are described in option C:

"C. The rule base can be built of layers, each containing a set of the security rules. Layers are inspected in the order in which they are defined, allowing control over the rule base flow and which security functionalities take precedence."

This feature, known as Rule Base Layers, allows for greater flexibility and control in organizing and prioritizing security rules within the rule base.

Options A, B, and D do not specifically pertain to features introduced in R81.20 and are available in earlier versions as well.


Reference:

Check Point Certified Security Expert (CCSE) R81 documentation and learning resources.



Which CLI command will reset the IPS pattern matcher statistics?

  1. ips reset pmstat
  2. ips pstats reset
  3. ips pmstats refresh
  4. ips pmstats reset

Answer(s): D

Explanation:

The CLI command to reset the IPS (Intrusion Prevention System) pattern matcher statistics is option
D: ips pmstats reset. This command will reset the statistics related to the IPS pattern matcher.

Options A, B, and C are not the correct syntax for resetting the IPS pattern matcher statistics.


Reference:

Check Point Certified Security Expert (CCSE) R81 documentation and learning resources.



When requiring certificates for mobile devices, make sure the authentication method is set to one of the following, Username and Password, RADIUS or ________.

  1. SecureID
  2. SecurID
  3. Complexity
  4. TacAcs

Answer(s): B

Explanation:

When requiring certificates for mobile devices, the authentication method should be set to one of the following:

Username and Password
RADIUS
SecurID (RSA SecurID)
So, the correct answer is option B, "SecurID."

Options A, C, and D are not standard authentication methods for mobile devices in this context.


Reference:

Check Point Certified Security Expert (CCSE) R81 documentation and learning resources.



Check Point recommends configuring Disk Space Management parameters to delete old log entries when available disk space is less than or equal to?

  1. 50%
  2. 75%
  3. 80%
  4. 15%

Answer(s): D

Explanation:

Check Point recommends configuring Disk Space Management parameters to delete old log entries when available disk space is less than or equal to a certain threshold. In this case, the correct threshold is specified as option D: 15%.

So, when the available disk space reaches or falls below 15%, old log entries should be deleted to free up space.

Options A, B, and C do not represent the recommended threshold for deleting old log entries according to Check Point's best practices.


Reference:

Check Point Certified Security Expert (CCSE) R81 documentation and learning resources.



Page 25 of 158



Post your Comments and Discuss Checkpoint 156-315.81 exam with other Community members:

Fon commented on January 05, 2024
Q40 is wrong, correct reponse is 'Accept' template is enabled by default in R81.20
AUSTRALIA
upvote

Gavin commented on August 24, 2023
Question76 is wrong, Manual NAT ALWAYS comes first
Anonymous
upvote

stephane T commented on July 29, 2023
very usefull
CAMEROON
upvote