Free 156-315.81 Exam Braindumps (page: 29)

Page 28 of 158

Which of the following is NOT a component of Check Point Capsule?

  1. Capsule Docs
  2. Capsule Cloud
  3. Capsule Enterprise
  4. Capsule Workspace

Answer(s): C

Explanation:

Check Point Capsule is a suite of solutions designed to provide comprehensive mobile security and secure access. The components of Check Point Capsule include:

Capsule Docs (Option A): A component that secures document sharing and protects sensitive data.

Capsule Cloud (Option B): A component that provides cloud-based security services.

Capsule Workspace (Option D): A component that provides secure workspace on mobile devices.

Option C, "Capsule Enterprise," is not a recognized component of Check Point Capsule based on the available information. Therefore, it is the correct answer as the component that is NOT part of Check Point Capsule.


Reference:

Check Point Certified Security Expert (CCSE) R81 training materials and documentation.



What is the purpose of Priority Delta in VRRP?

  1. When a box up, Effective Priority = Priority + Priority Delta
  2. When an Interface is up, Effective Priority = Priority + Priority Delta
  3. When an Interface fail, Effective Priority = Priority ­ Priority Delta
  4. When a box fail, Effective Priority = Priority ­ Priority Delta

Answer(s): C

Explanation:

Each instance of VRRP running on a supported interface may monitor the link state of other interfaces. The monitored interfaces do not have to be running VRRP. If a monitored interface loses its link state, then VRRP will decrement its priority over a VRID by the specified delta value and then will send out a new VRRP HELLO packet. If the new effective priority is less than the priority a backup platform has, then the backup platform will begin to send out its own HELLO packet.
Once the master sees this packet with a priority greater than its own, then it releases the VIP.


Reference:



Which statements below are CORRECT regarding Threat Prevention profiles in Smart Dashboard?

  1. You can assign only one profile per gateway and a profile can be assigned to one rule Only.
  2. You can assign multiple profiles per gateway and a profile can be assigned to one rule only.
  3. You can assign multiple profiles per gateway and a profile can be assigned to one or more rules.
  4. You can assign only one profile per gateway and a profile can be assigned to one or more rules.

Answer(s): C

Explanation:

In SmartDashboard, Threat Prevention profiles can be assigned to one or more rules. This means that you can have multiple profiles assigned to a single gateway, and each of these profiles can be associated with one or more rules. This allows for granular control over threat prevention settings for different rules or scenarios.


Reference:

Check Point Certified Security Expert R81 documentation and learning resources.



Using ClusterXL, what statement is true about the Sticky Decision Function?

  1. Can only be changed for Load Sharing implementations
  2. All connections are processed and synchronized by the pivot
  3. Is configured using cpconfig
  4. Is only relevant when using SecureXL

Answer(s): A

Explanation:

The Sticky Decision Function in ClusterXL is primarily used in Load Sharing implementations. In Load Sharing, the pivot member is responsible for determining the destination of new connections and ensures that traffic from the same source IP address is directed to the same cluster member. This ensures session stickiness for the same source IP, improving load sharing efficiency.


Reference:

Check Point Certified Security Expert R81 documentation and learning resources.






Post your Comments and Discuss Checkpoint 156-315.81 exam with other Community members:

156-315.81 Discussions & Posts