In R81 spoofing is defined as a method of:
Answer(s): D
In R81, spoofing is defined as a method of making packets appear as if they come from an authorized IP address. Spoofing can be used by attackers to bypass security policies or hide their identity. Check Point firewalls use anti-spoofing mechanisms to prevent spoofed packets from entering or leaving the network.
Security Gateway R81 Administration Guide:
Connections to the Check Point R81 Web API use what protocol?
Answer(s): A
Connections to the Check Point R81 Web API use the HTTPS protocol. The Web API is a RESTful web service that allows you to perform management tasks on the Security Management Server using HTTP requests.
Check Point Management APIs
Which command lists all tables in Gaia?
Answer(s): C
The fw tab -s command lists all tables in Gaia. The fw tab command displays information about the firewall tables, such as connections, NAT translations, SAM rules, etc. The -s option shows a summary of all tables.
fw tab - Check Point Support Center
What is true about the IPS-Blade?
In R81, IPS is managed by the Threat Prevention Policy. The Threat Prevention Policy is a unified policy that allows you to configure and enforce IPS, Anti-Bot, Anti-Virus, Threat Emulation, and Threat Extraction settings in one place.
Threat Prevention Administration Guide
Post your Comments and Discuss Checkpoint 156-315.81 exam with other Community members:
Fon commented on January 05, 2024 Q40 is wrong, correct reponse is 'Accept' template is enabled by default in R81.20 AUSTRALIA upvote
Gavin commented on August 24, 2023 Question76 is wrong, Manual NAT ALWAYS comes first Anonymous upvote
stephane T commented on July 29, 2023 very usefull CAMEROON upvote