Check Point 156-215.81.20 Real Exam Questions
The questions for 156-215.81.20 were last updated at Nov 20,2024.
- Exam Code: 156-215.81.20
- Exam Name: Check Point Certified Security Administrator R81.20
- Certification Provider: Check Point
- Latest update: Nov 20,2024
R80.10 management server can manage gateways with which versions installed?
- A . Versions R77 and higher
- B . Versions R76 and higher
- C . Versions R75.20 and higher
- D . Version R75 and higher
How would you determine the software version from the CLI?
- A . fw ver
- B . fw stat
- C . fw monitor
- D . cpinfo
SmartEvent does NOT use which of the following procedures to identity events:
- A . Matching a log against each event definition
- B . Create an event candidate
- C . Matching a log against local exclusions
- D . Matching a log against global exclusions
Please choose correct command syntax to add an “emailserver1” host with IP address 10.50.23.90 using GAiA management CLI?
- A . hostname myHost12 ip-address 10.50.23.90
- B . mgmt add host name ip-address 10.50.23.90
- C . add host name emailserver1 ip-address 10.50.23.90
- D . mgmt add host name emailserver1 ip-address 10.50.23.90
In Logging and Monitoring, the tracking options are Log, Detailed Log and Extended Log.
Which of the following options can you add to each Log, Detailed Log and Extended Log?
- A . Accounting
- B . Suppression
- C . Accounting/Suppression
- D . Accounting/Extended
You are asked to check the status of several user-mode processes on the management server and gateway.
Which of the following processes can only be seen on a Management Server?
- A . fwd
- B . fwm
- C . cpd
- D . cpwd
What is the main difference between Threat Extraction and Threat Emulation?
- A . Threat Emulation never delivers a file and takes more than 3 minutes to complete
- B . Threat Extraction always delivers a file and takes less than a second to complete
- C . Threat Emulation never delivers a file that takes less than a second to complete
- D . Threat Extraction never delivers a file and takes more than 3 minutes to complete
Fill in the blank: Service blades must be attached to a ______________.
- A . Security Gateway
- B . Management container
- C . Management server
- D . Security Gateway container
What protocol is specifically used for clustered environments?
- A . Clustered Protocol
- B . Synchronized Cluster Protocol
- C . Control Cluster Protocol
- D . Cluster Control Protocol
Which of the following is NOT a component of Check Point Capsule?
- A . Capsule Docs
- B . Capsule Cloud
- C . Capsule Enterprise
- D . Capsule Workspace