Checkpoint 156-315 Check Point Security Administration NGX II R65 156-315 Exam Questions in PDF

Free Checkpoint 156-315 Dumps Questions (page: 13)

You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each profile defines a(n) _____ or _____ action for the file types.

  1. Inspect/Bypass
  2. Inspect/Prevent
  3. Prevent/Bypass
  4. Detect/Bypass

Answer(s): A

Explanation:

You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each profile defines an Inspect or Bypass action for the file types. The Inspect action means that the file will be sent to the Threat Emulation engine for analysis, and the Bypass action means that the file will not be sent and will be allowed or blocked based on other Threat Prevention blades1. The other options are not valid actions for file types in Threat Prevention profiles.


Reference:

Check Point R81 Threat Prevention Administration Guide



When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?

  1. None, Security Management Server would be installed by itself.
  2. SmartConsole
  3. SecureClient
  4. Security Gateway
  5. SmartEvent

Answer(s): D

Explanation:

When doing a Stand-Alone Installation, you would install the Security Management Server with the Security Gateway as the other Check Point architecture component. A Stand-Alone Installation is where the Security Management Server and the Security Gateway are installed on the same machine2. The other options are either not Check Point architecture components, or not suitable for a Stand-Alone Installation.


Reference:

Check Point R81 Installation and Upgrade Guide



On R81.20 when configuring Third-Party devices to read the logs using the LEA (Log Export API) the default Log Server uses port:

  1. 18210
  2. 18184
  3. 257
  4. 18191

Answer(s): B

Explanation:

On R81.20, when configuring Third-Party devices to read the logs using the LEA (Log Export API), the default Log Server uses port 18184. This port can be changed using the lea_server command in expert mode. The other ports are either not related to LEA, or used for different purposes, such as 18210 for CPMI, 257 for FW1_log, and 18191 for SIC.


Reference:

[Check Point R81 Logging and Monitoring Administration Guide], [Check Point Ports Used for Communication by Various Check Point Modules]



How many images are included with Check Point TE appliance in Recommended Mode?

  1. 2(OS) images
  2. images are chosen by administrator during installation
  3. as many as licensed for
  4. the newest image

Answer(s): A

Explanation:

The Check Point TE appliance in Recommended Mode includes 2(OS) images. One image is used for running the appliance, and the other image is used for backup and recovery purposes. The images are not chosen by the administrator during installation, nor based on the license or the latest version.


Reference:

[Check Point R81 Threat Emulation Administration Guide]



What is the least amount of CPU cores required to enable CoreXL?

  1. 2
  2. 1
  3. 4
  4. 6

Answer(s): A

Explanation:

The least amount of CPU cores required to enable CoreXL is 2. CoreXL is a technology that improves the performance of Security Gateways by using multiple CPU cores to process traffic in parallel. CoreXL requires at least two CPU cores, one for SND (Secure Network Distributor) and one for a Firewall instance. The other options are either too few or too many CPU cores for enabling CoreXL.


Reference:

[Check Point R81 SecureXL Administration Guide], [Check Point R81 Performance Tuning Administration Guide]



Share your comments for Checkpoint 156-315 exam with other users:

T
Thembelani
5/30/2023 2:45:00 AM

need this dumps

A
Abduraimov
4/19/2023 12:43:00 AM

preparing for this exam is overwhelming. you cannot pass without the help of these exam dumps.

P
Puneeth
10/5/2023 2:06:00 AM

new to this site but i feel it is good

A
Ashok Kumar
1/2/2024 6:53:00 AM

the correct answer to q8 is b. explanation since the mule app has a dependency, it is necessary to include project modules and dependencies to make sure the app will run successfully on the runtime on any other machine. source code of the component that the mule app is dependent of does not need to be included in the exported jar file, because the source code is not being used while executing an app. compiled code is being used instead.

M
Merry
7/30/2023 6:57:00 AM

good questions

V
VoiceofMidnight
12/17/2023 4:07:00 PM

Delayed the exam until December 29th.

U
Umar Ali
8/29/2023 2:59:00 PM

A and D are True

V
vel
8/28/2023 9:17:09 AM

good one with explanation

G
Gurdeep
1/18/2024 4:00:15 PM

This is one of the most useful study guides I have ever used.

AI Tutor 👋 I’m here to help!