Free 156-315.81 Exam Braindumps (page: 48)

Page 47 of 158

When installing a dedicated R81 SmartEvent server.
What is the recommended size of the root partition?

  1. Any size
  2. Less than 20GB
  3. More than 10GB and less than 20GB
  4. At least 20GB

Answer(s): D

Explanation:

At least 20GB is the recommended size of the root partition when installing a dedicated R81 SmartEvent server. The root partition is the primary partition that contains the operating system files and other essential files for booting and running the system. The SmartEvent server requires at least 20GB of free space on the root partition to install and operate properly. If the root partition size is less than 20GB, you may encounter errors or performance issues with SmartEvent.


Reference:

Check Point Security Expert R81 Course, SmartEvent Administration Guide



As an administrator, you may be required to add the company logo to reports. To do this, you would save the logo as a PNG file with the name `cover-company-logo.png' and then copy that image file to which directory on the SmartEvent server?

  1. SFWDIR/smartevent/conf
  2. $RTDIR/smartevent/conf
  3. $RTDIR/smartview/conf
  4. $FWDIR/smartview/conf

Answer(s): C

Explanation:

To add the company logo to reports, you would save the logo as a PNG file with the name `cover- company-logo.png' and then copy that image file to the $RTDIR/smartview/conf directory on the SmartEvent server. The $RTDIR is an environment variable that points to the runtime directory of the

SmartEvent server, which is usually /opt/CPrt-R81. The smartview/conf directory contains the configuration files for SmartView, which is a web-based interface for viewing reports and dashboards generated by SmartEvent.


Reference:

SmartEvent Administration Guide, SK120193 - How to add a company logo to SmartView reports



Which one of the following is true about Threat Extraction?

  1. Always delivers a file to user
  2. Works on all MS Office, Executables, and PDF files
  3. Can take up to 3 minutes to complete
  4. Delivers file only if no threats found

Answer(s): A

Explanation:

Threat Extraction is a software blade that always delivers a file to user. Threat Extraction removes or sanitizes the active content from the files and converts them to PDF format, which is safer and more compatible. Threat Extraction can also work together with Threat Emulation to provide both clean and original files to the users. Threat Extraction works on MS Office, PDF, and archive files, but not on executables. Threat Extraction can take up to 3 minutes to complete, depending on the file size and complexity.


Reference:

Check Point Security Expert R81 Course, Threat Extraction Administration Guide



Which one of the following is true about Threat Emulation?

  1. Takes less than a second to complete
  2. Works on MS Office and PDF files only
  3. Always delivers a file
  4. Takes minutes to complete (less than 3 minutes)

Answer(s): D

Explanation:

Threat Emulation is a software blade that takes minutes to complete (less than 3 minutes). Threat Emulation analyzes files for malicious behavior by running them in a virtual sandbox. Threat Emulation works on MS Office, PDF, executables, and archive files. Threat Emulation does not always deliver a file, but only if no threats are found or if the user chooses to download the original file after seeing a warning message.


Reference:

Check Point Security Expert R81 Course, Threat Emulation Administration Guide






Post your Comments and Discuss Checkpoint 156-315.81 exam with other Community members:

156-315.81 Exam Discussions & Posts