Free 156-315.81 Exam Braindumps (page: 51)

Page 50 of 158

Which web services protocol is used to communicate to the Check Point R81 Identity Awareness Web API?

  1. SOAP
  2. REST
  3. XLANG
  4. XML-RPC

Answer(s): B

Explanation:

The Check Point R81 Identity Awareness Web API uses the REST web services protocol to communicate with external identity sources. REST stands for Representational State Transfer, and it is an architectural style for designing web services that use HTTP methods to access and manipulate resources. The Identity Awareness Web API allows external identity sources to send identity and session information to the Security Gateway, which can then use this information for policy enforcement.



What is mandatory for ClusterXL to work properly?

  1. The number of cores must be the same on every participating cluster node
  2. The Magic MAC number must be unique per cluster node
  3. The Sync interface must not have an IP address configured
  4. If you have "Non-monitored Private" interfaces, the number of those interfaces must be the same on all cluster members

Answer(s): B

Explanation:

For ClusterXL to work properly, one of the mandatory requirements is that the Magic MAC number must be unique per cluster node. The Magic MAC number is a MAC address that is used by ClusterXL to hide the physical MAC addresses of the cluster members from the network. This way, the cluster can present a single virtual MAC address to the network, and avoid ARP issues when a failover occurs. The Magic MAC number is derived from the Cluster Virtual IP address, which must also be unique per cluster.



Please choose correct command to add an "emailserver1" host with IP address 10.50.23.90 using GAiA management CLI?

  1. host name myHost12 ip-address 10.50.23.90
  2. mgmt: add host name ip-address 10.50.23.90
  3. add host name emailserver1 ip-address 10.50.23.90
  4. mgmt: add host name emailserver1 ip-address 10.50.23.90

Answer(s): D

Explanation:

The correct command to add an "emailserver1" host with IP address 10.50.23.90 using GAiA management CLI is mgmt: add host name emailserver1 ip-address 10.50.23.90. This command will create a new host object in the Security Management Server database, with the specified name and IP address. The mgmt: prefix indicates that the command is executed on the Security Management Server, and not on the local GAiA machine. The other commands are either missing the mgmt: prefix, or have incorrect syntax or parameters.



Using Threat Emulation technologies, what is the best way to block .exe and .bat file types?

  1. enable DLP and select.exe and .bat file type
  2. enable .exe & .bat protection in IPS Policy
  3. create FW rule for particular protocol
  4. tecli advanced attributes set prohibited_file_types exe.bat

Answer(s): A

Explanation:

The best way to block .exe and .bat file types using Threat Emulation technologies is to enable DLP and select .exe and .bat file type. DLP stands for Data Loss Prevention, and it is a feature that allows administrators to define rules and actions to protect sensitive data from unauthorized access or transfer. One of the DLP rule conditions is File Type, which can be used to block or alert on specific file types, such as .exe and .bat, that may contain malicious code or scripts. The other options are either not related to Threat Emulation technologies, or not effective in blocking .exe and .bat file types.






Post your Comments and Discuss Checkpoint 156-315.81 exam with other Community members:

156-315.81 Exam Discussions & Posts