Which web services protocol is used to communicate to the Check Point R81 Identity Awareness Web API?
Answer(s): B
The Check Point R81 Identity Awareness Web API uses the REST web services protocol to communicate with external identity sources. REST stands for Representational State Transfer, and it is an architectural style for designing web services that use HTTP methods to access and manipulate resources. The Identity Awareness Web API allows external identity sources to send identity and session information to the Security Gateway, which can then use this information for policy enforcement.
What is mandatory for ClusterXL to work properly?
For ClusterXL to work properly, one of the mandatory requirements is that the Magic MAC number must be unique per cluster node. The Magic MAC number is a MAC address that is used by ClusterXL to hide the physical MAC addresses of the cluster members from the network. This way, the cluster can present a single virtual MAC address to the network, and avoid ARP issues when a failover occurs. The Magic MAC number is derived from the Cluster Virtual IP address, which must also be unique per cluster.
Please choose correct command to add an "emailserver1" host with IP address 10.50.23.90 using GAiA management CLI?
Answer(s): D
The correct command to add an "emailserver1" host with IP address 10.50.23.90 using GAiA management CLI is mgmt: add host name emailserver1 ip-address 10.50.23.90. This command will create a new host object in the Security Management Server database, with the specified name and IP address. The mgmt: prefix indicates that the command is executed on the Security Management Server, and not on the local GAiA machine. The other commands are either missing the mgmt: prefix, or have incorrect syntax or parameters.
Using Threat Emulation technologies, what is the best way to block .exe and .bat file types?
Answer(s): A
The best way to block .exe and .bat file types using Threat Emulation technologies is to enable DLP and select .exe and .bat file type. DLP stands for Data Loss Prevention, and it is a feature that allows administrators to define rules and actions to protect sensitive data from unauthorized access or transfer. One of the DLP rule conditions is File Type, which can be used to block or alert on specific file types, such as .exe and .bat, that may contain malicious code or scripts. The other options are either not related to Threat Emulation technologies, or not effective in blocking .exe and .bat file types.
Post your Comments and Discuss Checkpoint 156-315.81 exam with other Community members:
Charoo Commented on December 08, 2024 So many questions felt familiar during the exam, and the explanations helped me understand the tougher topics. Thanks, I passed. INDIA
stephane T Commented on July 29, 2023 very usefull CAMEROON
Our website is free, but we have to fight against bots and content theft. We're sorry for the inconvenience caused by these security measures. You can access the rest of the 156-315.81 content, but please register or login to continue.