If you needed the Multicast MAC address of a cluster, what command would you run?
A . cphaprob Ca if
B. cphaconf ccp multicast
C. cphaconf debug data
D. cphaprob igmp
Answer: D
156-315.81 Check Point Certified Security Expert R81 exam is a hot Check Point certification exam, Exam4Training offers you the latest free online 156-315.81 dumps to practice. You can get online training in the following questions, all these questions are verified by Check Point experts. If this exam changed, we will share new update questions.
If you needed the Multicast MAC address of a cluster, what command would you run?
A . cphaprob Ca if
B. cphaconf ccp multicast
C. cphaconf debug data
D. cphaprob igmp
Answer: D
Which packet info is ignored with Session Rate Acceleration?
A . source port ranges
B. source ip
C. source port
D. same info from Packet Acceleration is used
Answer: B
Which command shows actual allowed connections in state table?
A . fw tab Ct StateTable
B. fw tab Ct connections
C. fw tab Ct connection
D. fw tab connections
Answer: B
Which one of these features is NOT associated with the Check Point URL Filtering and
Application Control Blade?
A . Detects and blocks malware by correlating multiple detection engines before users are affected.
B. Configure rules to limit the available network bandwidth for specified users or groups.
C. Use UserCheck to help users understand that certain websites are against the company’s security policy.
D. Make rules to allow or block applications and Internet sites for individual applications, categories, and risk levels.
Answer: A
How many images are included with Check Point TE appliance in Recommended Mode?
A . 2(OS) images
B. images are chosen by administrator during installation
C. as many as licensed for
D. the most new image
Answer: A
Which TCP-port does CPM process listen to?
A . 18191
B. 18190
C. 8983
D. 19009
Answer: D
What is the correct command to observe the Sync traffic in a VRRP environment?
A . fw monitor Ce “accept[12:4,b]=224.0.0.18;”
B. fw monitor Ce “accept port(6118;”
C. fw monitor Ce “accept proto=mcVRRP;”
D. fw monitor Ce “accept dst=224.0.0.18;”
Answer: D
When requiring certificates for mobile devices, make sure the authentication method is set to one of the following, Username and Password, RADIUS or ________.
A . SecureID
B. SecurID
C. Complexity
D. TacAcs
Answer: B
Which of the following is a new R81 Gateway feature that had not been available in R77.X and older?
A . The rule base can be built of layers, each containing a set of the security rules. Layers are inspected in the order in which they are defined, allowing control over the rule base flow and which security functionalities take precedence.
B. Limits the upload and download throughput for streaming media in the company to 1 Gbps.
C. Time object to a rule to make the rule active only during specified times.
D. Sub Policies ae sets of rules that can be created and attached to specific rules. If the
rule is matched, inspection will continue in the sub policy attached to it rather than in the next rule.
Answer: D
During inspection of your Threat Prevention logs you find four different computers having one event each with a Critical Severity.
Which of those hosts should you try to remediate first?
A . Host having a Critical event found by Threat Emulation
B. Host having a Critical event found by IPS
C. Host having a Critical event found by Antivirus
D. Host having a Critical event found by Anti-Bot
Answer: D