Checkpoint 156-915.71 Exam
Check Point Certified Security Expert R71 Update (Page 4 )

Updated On: 26-Jan-2026

You just upgraded to R71 and are using the IPS Software Blade You want to enable all critical protections while keeping the rate of false positively very low. How can you achieve this?

  1. The new IPS system is based on policies, but it has no ability to calculate or change the confidence level, so it always has a high rate of false positives.
  2. This can’t be achieved; activating any IPS system always causes a high rate of false positives.
  3. The new IPS system is based on policies and gives you the ability to activate all checks with critical severity and a high confidence level.
  4. As in SmartDefense, this can be achieved by activating all the critical checks manually.

Answer(s): C



Refer to the network topology below. You have IPS Software Blades active on the Security Gateways sglondon, sgla, and sgny, but still experience attacks on the Web server in the New York DMZ. How is this possible?

  1. AH of these options are possible.
  2. The attacker may have used a bunch of evasion techniques like using escape sequence instead of cleartext commands. It is also possible that there are entry points not shown in the network layout, like rogue access points.
  3. Since other Gateways do not have IPS activated, attacks may originate from their network without anyone noticing.
  4. An IPS may combine different detection technologies, but is dependent on regular signature updates and well-turned anomaly algorithms. Even if this is accomplished, no technology can offer 100 % protection.

Answer(s): C



Which of the following is NOT an Smartevent event-triggered Automatic Reaction?

  1. Mail
  2. Block Access
  3. External Script
  4. SNMP Trap

Answer(s): B



Your company has the requirement that SmartEvent reports should show a detailed and accurate view of network activity but also performance should be guaranteed. Which actions should be taken to achieve that?

(i)Use same hard drive for database directory, log files and temporary directory
(ii)Use Consolidation Rules
(iii)Limit logging to blocked traffic only
(iv)Using Multiple Database Tables

  1. (i), (ii) and (iv)
  2. (i), (iii), (iv)
  3. (ii) and (iv)
  4. (i) and (ii)

Answer(s): C



Viewing page 4 of 80
Viewing questions 13 - 16 out of 313 questions



Post your Comments and Discuss Checkpoint 156-915.71 exam prep with other Community members:

Join the 156-915.71 Discussion