Free 156-315.81 Exam Braindumps (page: 7)

Page 7 of 158

In R81 spoofing is defined as a method of:

  1. Disguising an illegal IP address behind an authorized IP address through Port Address Translation.
  2. Hiding your firewall from unauthorized users.
  3. Detecting people using false or wrong authentication logins
  4. Making packets appear as if they come from an authorized IP address.

Answer(s): D

Explanation:

In R81, spoofing is defined as a method of making packets appear as if they come from an authorized IP address. Spoofing can be used by attackers to bypass security policies or hide their identity. Check Point firewalls use anti-spoofing mechanisms to prevent spoofed packets from entering or leaving the network.


Reference:

Security Gateway R81 Administration Guide:



Connections to the Check Point R81 Web API use what protocol?

  1. HTTPS
  2. RPC
  3. VPN
  4. SIC

Answer(s): A

Explanation:

Connections to the Check Point R81 Web API use the HTTPS protocol. The Web API is a RESTful web service that allows you to perform management tasks on the Security Management Server using HTTP requests.


Reference:

Check Point Management APIs



Which command lists all tables in Gaia?

  1. fw tab ­t
  2. fw tab ­list
  3. fw-tab ­s
  4. fw tab -1

Answer(s): C

Explanation:

The fw tab -s command lists all tables in Gaia. The fw tab command displays information about the firewall tables, such as connections, NAT translations, SAM rules, etc. The -s option shows a summary of all tables.


Reference:

fw tab - Check Point Support Center



What is true about the IPS-Blade?

  1. In R81, IPS is managed by the Threat Prevention Policy
  2. In R81, in the IPS Layer, the only three possible actions are Basic, Optimized and Strict
  3. In R81, IPS Exceptions cannot be attached to "all rules"
  4. In R81, the GeoPolicy Exceptions and the Threat Prevention Exceptions are the same

Answer(s): A

Explanation:

In R81, IPS is managed by the Threat Prevention Policy. The Threat Prevention Policy is a unified policy that allows you to configure and enforce IPS, Anti-Bot, Anti-Virus, Threat Emulation, and Threat Extraction settings in one place.


Reference:

Threat Prevention Administration Guide



Page 7 of 158



Post your Comments and Discuss Checkpoint 156-315.81 exam with other Community members:

Fon commented on January 05, 2024
Q40 is wrong, correct reponse is 'Accept' template is enabled by default in R81.20
AUSTRALIA
upvote

Gavin commented on August 24, 2023
Question76 is wrong, Manual NAT ALWAYS comes first
Anonymous
upvote

stephane T commented on July 29, 2023
very usefull
CAMEROON
upvote