Checkpoint 156-215.81 Practice Test - Questions Answers, Page 10

List of questions
Question 91

What is the Transport layer of the TCP/IP model responsible for?
The Transport layer of the TCP/IP model is responsible for managing the flow of data between two hosts to ensure that the packets are correctly assembled and delivered to the target application. It also provides error detection and correction, flow control, and multiplexing. The Transport layer uses protocols such as TCP and UDP.
Question 92

Which of the following is the most secure means of authentication?
Certificate is the most secure means of authentication among the given options2. A certificate is a digital document that contains information about the identity of a user or a device, and is signed by a trusted authority. A certificate can be used to prove the identity of a user or a device without revealing any sensitive information, such as passwords or tokens. Password, token, and pre-shared secret are less secure means of authentication because they can be easily compromised, stolen, or guessed by attackers.
Reference:Secure User Authentication Methods - freeCodeCamp.org,What is the Most Secure Authentication Method for Your Organization ...
Question 93

What is the BEST command to view configuration details of all interfaces in Gaia CLISH?
The BEST command to view configuration details of all interfaces in Gaia CLISH isshow configuration interface3. This command displays the interface name, IP address, netmask, state, MTU, and other parameters for each interface. ifconfig -a, show interfaces, and show interfaces detail are not valid commands in Gaia CLISH.
Reference:How to configure static routes in CLISH on Gaia OS and IPSO OS,GAIA CLISH Commands - Fir3net,Gaia Administration Guide R80 - Check Point Software,Gaia Clish commands including User Defined (Extended) commands
Question 94

Fill in the blank: Authentication rules are defined for ____________.
Authentication rules are defined foruser groupsrather than individual users1. To define authentication rules, you must first define users and groups.You can define users with the Check Point user database, or with an external server, such as LDAP1.UserCheck is a feature that enables user interaction with security events2. Individual users and all users in the database are not valid options for defining authentication rules.
Reference:How to Configure Client Authentication,UserCheck
Question 95

Which tool provides a list of trusted files to the administrator so they can specify to the Threat Prevention blade that these files do not need to be scanned or analyzed?
ThreatWiki is a tool that provides a list of trusted files to the administrator so they can specify to the Threat Prevention blade that these files do not need to be scanned or analyzed3. ThreatWiki is a web-based service that collects information about files from various sources, such as Check Point customers, partners, and researchers.Administrators can use ThreatWiki to view file reputation, upload files for analysis, and download indicators of compromise3. Whitelist Files, AppWiki, and IPS Protections are not tools that provide a list of trusted files.
Reference:Threat Prevention R80.40 Administration Guide
Question 96

Which of the following is an authentication method used for Identity Awareness?
Captive Portal is an authentication method used for Identity Awareness4. Captive Portal is a web-based authentication method that redirects users to a browser-based login page when they try to access the network. Users must provide their credentials to access the network resources.Captive Portal can be used for guest users or users who are not identified by other methods4. SSL, PKI, and RSA are not authentication methods used for Identity Awareness, but rather encryption or certificate technologies.
Reference:Identity Awareness Reference Architecture and Best Practices
Question 97

The SIC Status ''Unknown'' means
The SIC Status ''Unknown'' means that there is no connection between the gateway and Security Management Server.This can happen if the gateway is down, unreachable, or has not been initialized yet12.
Reference:Check Point R81 Security Management Administration Guide,Free Check Point CCSA Sample Questions and Study Guide
Question 98

What is a reason for manual creation of a NAT rule?
A reason for manual creation of a NAT rule is when the public IP-address is different from the gateway's external IP.This can happen when the gateway is behind another NAT device or firewall3.
Reference:Check Point R81 Security Gateway Administration Guide,Check Point CCSA - R81: Practice Test & Explanation
Question 99

Which of the following commands is used to verify license installation?
The command cplic print is used to verify license installation. It displays the installed licenses and their expiration dates .
Reference: [Check Point R81 Command Line Interface Reference Guide],Check Point :: Pearson VUE
Question 100

To enforce the Security Policy correctly, a Security Gateway requires:
To enforce the Security Policy correctly, a Security Gateway requires awareness of the network topology. This means that the gateway knows which networks and interfaces are internal and external, and how to route packets between them .
Reference: [Check Point R81 Security Gateway Technical Administration Guide],Check Point CCSA - R81: Practice Test & Explanation
Question