Free 156-315.81 Exam Braindumps (page: 45)

Page 44 of 158

What component of R81 Management is used for indexing?

  1. DBSync
  2. API Server
  3. fwm
  4. SOLR

Answer(s): D

Explanation:

The component of R81 Management that is used for indexing is SOLR. SOLR is an open-source enterprise search platform that provides fast and scalable indexing and searching capabilities. SOLR is used by SmartConsole to index the objects and rules in the security policy, as well as the logs and events in SmartLog and SmartEvent. SOLR enables quick and easy access to the relevant information in the management database.


Reference:

Check Point Security Expert R81 Course, SOLR Troubleshooting



After making modifications to the $CVPNDIR/conf/cvpnd.C file, how would you restart the daemon?

  1. cvpnd_restart
  2. cvpnd_restart
  3. cvpnd restart
  4. cvpnrestart

Answer(s): B

Explanation:

The cvpnd_restart command is used to restart the daemon after making modifications to the $CVPNDIR/conf/cvpnd.C file. The cvpnd daemon is responsible for managing the communication between the Check Point components and the Content Vectoring Protocol (CVP) server. The CVP server is an external server that provides content inspection and filtering services for Check Point gateways. The $CVPNDIR/conf/cvpnd.C file contains the configuration settings for the cvpnd daemon, such as the CVP server IP address, port number, timeout value, and debug level.


Reference:

Check Point Security Expert R81 Course, Content Inspection Using ICAP, cvpnd daemon debug file



SandBlast has several functional components that work together to ensure that attacks are prevented in real-time.
Which the following is NOT part of the SandBlast component?

  1. Threat Emulation
  2. Mobile Access
  3. Mail Transfer Agent
  4. Threat Cloud

Answer(s): B

Explanation:

Mobile Access is not part of the SandBlast component. Mobile Access is a software blade that provides secure remote access to corporate resources from various devices, such as smartphones, tablets, and laptops. Mobile Access supports different connectivity methods, such as SSL VPN, IPsec VPN, and Mobile Enterprise Application Store (MEAS). Mobile Access also integrates with Mobile

Threat Prevention (MTP) to protect mobile devices from malware and network attacks.


Reference:

Check Point Security Expert R81 Course, Mobile Access Administration Guide, SandBlast Mobile Datasheet



With Mobile Access enabled, administrators select the web-based and native applications that can be accessed by remote users and define the actions that users can perform the applications. Mobile Access encrypts all traffic using:

  1. HTTPS for web-based applications and 3DES or RC4 algorithm for native applications. For end users to access the native applications, they need to install the SSL Network Extender.
  2. HTTPS for web-based applications and AES or RSA algorithm for native applications. For end users to access the native application, they need to install the SSL Network Extender.
  3. HTTPS for web-based applications and 3DES or RC4 algorithm for native applications. For end users to access the native applications, no additional software is required.
  4. HTTPS for web-based applications and AES or RSA algorithm for native applications. For end users to access the native application, no additional software is required.

Answer(s): A

Explanation:

Mobile Access encrypts all traffic using HTTPS for web-based applications and 3DES or RC4 algorithm for native applications. For end users to access the native applications, they need to install the SSL Network Extender, which is a lightweight VPN client that creates a secure SSL tunnel to the Mobile Access gateway. The SSL Network Extender supports various types of native applications, such as email clients, file sharing, and remote desktop.


Reference:

Mobile Access Administration Guide, SSL Network Extender






Post your Comments and Discuss Checkpoint 156-315.81 exam with other Community members:

156-315.81 Exam Discussions & Posts