Free 156-315.81 Exam Braindumps (page: 43)

Page 42 of 158

In the Check Point Firewall Kernel Module, each Kernel is associated with a key, which specifies the type of traffic applicable to the chain module. For Wire Mode configuration, chain modules marked with ____________ will not apply.

  1. ffff
  2. 1
  3. 2
  4. 3

Answer(s): B

Explanation:

In the Check Point Firewall Kernel Module, each kernel is associated with a key, which specifies the type of traffic applicable to the chain module. For Wire Mode configuration, chain modules marked with 1 will not apply, as they are related to NAT, VPN, or other features that are not supported in Wire Mode. Wire Mode is a mode of operation that allows transparent traffic forwarding without any inspection or modification by the firewall.


Reference:

Check Point Security Expert R81 Course, Wire Mode Configuration Guide



Which one of the following is true about Capsule Connect?

  1. It is a full layer 3 VPN client
  2. It offers full enterprise mobility management
  3. It is supported only on iOS phones and Windows PCs
  4. It does not support all VPN authentication methods

Answer(s): A

Explanation:

Capsule Connect is a full layer 3 VPN client that provides secure and seamless remote access to corporate networks from iOS and Android devices. It supports all VPN authentication methods, such as certificates, passwords, tokens, and challenge-response. It also supports split tunneling and seamless roaming.


Reference:

Capsule Connect Datasheet, Capsule Connect Administration Guide



How often does Threat Emulation download packages by default?

  1. Once a week
  2. Once an hour
  3. Twice per day
  4. Once per day

Answer(s): D

Explanation:

Threat Emulation downloads packages by default once per day. The packages contain updates for the Threat Emulation engine, signatures, and images. The download frequency can be changed in the Threat Prevention policy settings.


Reference:

Threat Emulation Administration Guide, Threat Prevention R81 Release Notes



You are investigating issues with to gateway cluster members are not able to establish the first initial cluster synchronization.
What service is used by the FWD daemon to do a Full Synchronization?

  1. TCP port 443
  2. TCP port 257
  3. TCP port 256
  4. UDP port 8116

Answer(s): C

Explanation:

The FWD daemon uses TCP port 256 to do a Full Synchronization between gateway cluster members. This port is also used for other synchronization types, such as Delta Synchronization and Accelerated Synchronization. The FWD daemon is responsible for synchronizing the connections table, NAT table, and VPN keys between cluster members.


Reference:

ClusterXL Administration Guide, SK25977 - Ports Used by Check Point Software






Post your Comments and Discuss Checkpoint 156-315.81 exam with other Community members:

156-315.81 Exam Discussions & Posts