Checkpoint 156-915.71 Exam Questions
Check Point Certified Security Expert R71 Update (Page 3 )

Updated On: 17-Feb-2026

To force clients to use integrity Security Workspace when accessing sensitive applications, the Administrator can configure Connectra:

  1. Via protection levels
  2. To implement integrity Clientless Security
  3. To force the user to re-authenticate at login
  4. Without a special setting. Secure Workspace is automatically configured.

Answer(s): A



The default port for browser access to the Management Portal is

  1. 4433
  2. 4343
  3. 8080
  4. 443

Answer(s): A



In which case is a Sticky Decision Function relevant?

  1. Load Sharing - Unicast
  2. Load Balancing - Forward
  3. High Availability
  4. Load Sharing - Multicast

Answer(s): D



You just upgraded to R71 and are using the IPS Software Blade You want to enable all critical protections while keeping the rate of false positively very low. How can you achieve this?

  1. The new IPS system is based on policies, but it has no ability to calculate or change the confidence level, so it always has a high rate of false positives.
  2. This can’t be achieved; activating any IPS system always causes a high rate of false positives.
  3. The new IPS system is based on policies and gives you the ability to activate all checks with critical severity and a high confidence level.
  4. As in SmartDefense, this can be achieved by activating all the critical checks manually.

Answer(s): C



Refer to the network topology below. You have IPS Software Blades active on the Security Gateways sglondon, sgla, and sgny, but still experience attacks on the Web server in the New York DMZ. How is this possible?

  1. AH of these options are possible.
  2. The attacker may have used a bunch of evasion techniques like using escape sequence instead of cleartext commands. It is also possible that there are entry points not shown in the network layout, like rogue access points.
  3. Since other Gateways do not have IPS activated, attacks may originate from their network without anyone noticing.
  4. An IPS may combine different detection technologies, but is dependent on regular signature updates and well-turned anomaly algorithms. Even if this is accomplished, no technology can offer 100 % protection.

Answer(s): C






Post your Comments and Discuss Checkpoint 156-915.71 exam dumps with other Community members:

Join the 156-915.71 Discussion