Free 156-315.81 Exam Braindumps (page: 44)

Page 43 of 158

Which statement is true about ClusterXL?

  1. Supports Dynamic Routing (Unicast and Multicast)
  2. Supports Dynamic Routing (Unicast Only)
  3. Supports Dynamic Routing (Multicast Only)
  4. Does not support Dynamic Routing

Answer(s): A

Explanation:

ClusterXL supports Dynamic Routing for both Unicast and Multicast traffic. Dynamic Routing protocols, such as OSPF, BGP, or PIM, can be configured on cluster members to exchange routing information with other routers. ClusterXL supports two modes of operation for Dynamic Routing:
New Mode and Legacy Mode.


Reference:

ClusterXL Administration Guide, SK98226 - ClusterXL New Mode Overview



Which command shows detailed information about VPN tunnels?

  1. cat $FWDIR/conf/vpn.conf
  2. vpn tu tlist
  3. vpn tu
  4. cpview

Answer(s): B

Explanation:

The command vpn tu tlist shows detailed information about VPN tunnels, such as the peer IP address, encryption domain, IKE phase 1 and phase 2 status, encryption algorithm, and tunnel uptime. The command vpn tu is an interactive tool that allows users to list, delete, or reconnect VPN tunnels. The command cpview is a real-time performance monitoring tool that shows various statistics about the system and network.


Reference:

VPN Administration Guide, SK97638 - What is cpview Utility and How to Use it



Which Check Point software blades could be enforced under Threat Prevention profile using Check Point R81.20 SmartConsole application?

  1. IPS, Anti-Bot, URL Filtering, Application Control, Threat Emulation.
  2. Firewall, IPS, Threat Emulation, Application Control.
  3. IPS, Anti-Bot, Anti-Virus, Threat Emulation, Threat Extraction.
  4. Firewall, IPS, Anti-Bot, Anti-Virus, Threat Emulation.

Answer(s): C

Explanation:

The Threat Prevention profile in Check Point R81.20 SmartConsole application allows you to enforce the following software blades: IPS, Anti-Bot, Anti-Virus, Threat Emulation, and Threat Extraction. These software blades provide comprehensive protection against various types of threats, such as network attacks, malware, ransomware, phishing, and zero-day exploits. You can configure the profile settings for each software blade, such as the action to take, the protection scope, and the exceptions.


Reference:

Check Point Security Expert R81 Course, Threat Prevention Administration

Guide



When gathering information about a gateway using CPINFO, what information is included or excluded when using the "-x" parameter?

  1. Includes the registry
  2. Gets information about the specified Virtual System
  3. Does not resolve network addresses
  4. Output excludes connection table

Answer(s): B

Explanation:

The cpinfo command is a tool that collects diagnostic data from a Check Point gateway or management server. The data includes configuration files, logs, status reports, and more. The cpinfo output can be used for troubleshooting or sent to Check Point support for analysis. The -x parameter is used to get information about the specified Virtual System on a VSX gateway. A Virtual System is a virtualized firewall instance that runs on a VSX gateway and has its own security policy and objects.


Reference:

Check Point Security Expert R81 Course, cpinfo Utility, VSX Administration Guide






Post your Comments and Discuss Checkpoint 156-315.81 exam with other Community members:

156-315.81 Exam Discussions & Posts