ExamGecko
Home / Checkpoint / 156-215.81 / List of questions
Ask Question

Checkpoint 156-215.81 Practice Test - Questions Answers, Page 11

Add to Whishlist

List of questions

Question 101

Report Export Collapse

Which configuration element determines which traffic should be encrypted into a VPN tunnel vs. sent in the clear?

The firewall topologies
The firewall topologies
NAT Rules
NAT Rules
The Rule Base
The Rule Base
The VPN Domains
The VPN Domains
Suggested answer: D
Explanation:

The VPN Domains configuration element determines which traffic should be encrypted into a VPN tunnel vs. sent in the clear.The VPN Domain is the set of hosts and networks that are allowed to communicate securely with the gateway12. The firewall topologies, NAT rules, and the rule base do not directly affect the VPN encryption decision.

Reference:Check Point R81 Security Gateway Technical Administration Guide,CCSA/CCSE Exam Tips & Content - R80.X vs. R81.X - Check Point CheckMates

asked 16/09/2024
ERIC LUM
44 questions

Question 102

Report Export Collapse

You have discovered suspicious activity in your network. What is the BEST immediate action to take?

Create a policy rule to block the traffic.
Create a policy rule to block the traffic.
Create a suspicious action rule to block that traffic.
Create a suspicious action rule to block that traffic.
Wait until traffic has been identified before making any changes.
Wait until traffic has been identified before making any changes.
Contact ISP to block the traffic.
Contact ISP to block the traffic.
Suggested answer: B
Explanation:

The BEST immediate action to take when you have discovered suspicious activity in your network is to create a suspicious action rule to block that traffic.A suspicious action rule is a special type of rule that is triggered when a predefined condition is met, such as a malicious file download, a ransomware attack, or a data exfiltration attempt13. A suspicious action rule can block the traffic, quarantine the source, or send an alert to the administrator. Creating a policy rule to block the traffic may not be effective if the traffic does not match the rule criteria or if the policy installation is delayed. Waiting until traffic has been identified before making any changes may allow the threat to spread or cause more damage. Contacting ISP to block the traffic may not be feasible or timely, and may also affect legitimate traffic.

Reference:Check Point R81 Security Gateway Technical Administration Guide,Check Point CCSA - R81: Practice Test & Explanation | Udemy

asked 16/09/2024
ahmad hafiz
40 questions

Question 103

Report Export Collapse

Tom has connected to the Management Server remotely using SmartConsole and is in the process of making some Rule Base changes, when he suddenly loses connectivity. Connectivity is restored shortly afterward. What will happen to the changes already made?

Tom will have to reboot his SmartConsole computer, clear the cache, and restore changes.
Tom will have to reboot his SmartConsole computer, clear the cache, and restore changes.
Tom will have to reboot his SmartConsole computer, and access the Management cache store on that computer, which is only accessible after a reboot.
Tom will have to reboot his SmartConsole computer, and access the Management cache store on that computer, which is only accessible after a reboot.
Tom's changes will be lost since he lost connectivity and he will have to start again.
Tom's changes will be lost since he lost connectivity and he will have to start again.
Tom's changes will have been stored on the Management when he reconnects and he will not lose any of his work.
Tom's changes will have been stored on the Management when he reconnects and he will not lose any of his work.
Suggested answer: D
Explanation:

Tom's changes will have been stored on the Management when he reconnects and he will not lose any of his work.This is because SmartConsole uses a session mechanism that allows users to work offline and save their changes locally until they are ready to publish them to the Management13. If Tom loses connectivity, he can resume his session when he reconnects and continue working on his Rule Base changes. He does not need to reboot his SmartConsole computer, clear the cache, or restore changes. His changes will not be lost since he lost connectivity.

Reference:Check Point R81 Security Management Administration Guide,Check Point CCSA - R81: Practice Test & Explanation | Udemy

asked 16/09/2024
Zakaria Boujli
32 questions

Question 104

Report Export Collapse

Which GUI tool can be used to view and apply Check Point licenses?

cpconfig
cpconfig
Management Command Line
Management Command Line
SmartConsole
SmartConsole
SmartUpdate
SmartUpdate
Suggested answer: D
Explanation:

The GUI tool that can be used to view and apply Check Point licenses is SmartUpdate.SmartUpdate is a centralized tool that allows you to manage licenses, software packages, and hotfixes for multiple gateways and clusters12. cpconfig, Management Command Line, and SmartConsole are not tools for license management.

Reference:Check Point R81 SmartUpdate Administration Guide,Check Point CCSA - R81: Practice Test & Explanation | Udemy

asked 16/09/2024
Sjoerd Kruit
41 questions

Question 105

Report Export Collapse

How would you determine the software version from the CLI?

fw ver
fw ver
fw stat
fw stat
fw monitor
fw monitor
cpinfo
cpinfo
Suggested answer: A
Explanation:

The command that can be used to determine the software version from the CLI is fw ver.This command displays the version of the firewall module and the build number3. fw stat, fw monitor, and cpinfo are not commands for software version identification.

Reference:Check Point R81 Command Line Interface Reference Guide, [156-315.81 Checkpoint Exam Info and Free Practice Test - ExamTopics]

asked 16/09/2024
Alireza Noura
43 questions

Question 106

Report Export Collapse

In R80 Management, apart from using SmartConsole, objects or rules can also be modified using:

3rd Party integration of CLI and API for Gateways prior to R80.
3rd Party integration of CLI and API for Gateways prior to R80.
A complete CLI and API interface using SSH and custom CPCode integration.
A complete CLI and API interface using SSH and custom CPCode integration.
3rd Party integration of CLI and API for Management prior to R80.
3rd Party integration of CLI and API for Management prior to R80.
A complete CLI and API interface for Management with 3rd Party integration.
A complete CLI and API interface for Management with 3rd Party integration.
Suggested answer: B
Explanation:

In R80 Management, apart from using SmartConsole, objects or rules can also be modified using a complete CLI and API interface using SSH and custom CPCode integration. This allows you to automate tasks, integrate with third-party tools, and create custom scripts . 3rd Party integration of CLI and API for Gateways or Management prior to R80 is not relevant for R80 Management. A complete CLI and API interface for Management with 3rd Party integration is not a specific option.

Reference: [Check Point R81 Security Management Administration Guide], [Check Point Learning and Training Frequently Asked Questions (FAQs)]

asked 16/09/2024
Monterio Weaver
40 questions

Question 107

Report Export Collapse

When connected to the Check Point R80 Management Server using the SmartConsole the first administrator to connect has a lock on:

Only the objects being modified in the Management Database and other administrators can connect to make changes using a special session as long as they all connect from the same LAN network.
Only the objects being modified in the Management Database and other administrators can connect to make changes using a special session as long as they all connect from the same LAN network.
The entire Management Database and other administrators can connect to make changes only if the first administrator switches to Read-only.
The entire Management Database and other administrators can connect to make changes only if the first administrator switches to Read-only.
The entire Management Database and all sessions and other administrators can connect only as Read-only.
The entire Management Database and all sessions and other administrators can connect only as Read-only.
Only the objects being modified in his session of the Management Database and other administrators can connect to make changes using different sessions.
Only the objects being modified in his session of the Management Database and other administrators can connect to make changes using different sessions.
Suggested answer: D
Explanation:

The answer is D because in R80 and above, the first administrator to connect to the Management Server using SmartConsole gets a lock on only the objects being modified in his session of the Management Database. Other administrators can connect to make changes using different sessions, but they cannot modify the same objects as the first administrator until he publishes his changes.This is called concurrent administration and it allows multiple administrators to work on the same policy package simultaneously12Reference:Check Point R80.10 Concurrent Administration,Check Point R80.40 Security Management Administration Guide

asked 16/09/2024
Diego Beltran
61 questions

Question 108

Report Export Collapse

Which is NOT an encryption algorithm that can be used in an IPSEC Security Association (Phase 2)?

AES-GCM-256
AES-GCM-256
AES-CBC-256
AES-CBC-256
AES-GCM-128
AES-GCM-128
Suggested answer: B
Explanation:

The answer is B because AES-CBC-256 is not a supported encryption algorithm for IPsec Security Associations (Phase 2) in R81.The supported encryption algorithms are AES-GCM-128, AES-GCM-256, AES-CBC-128, 3DES, and NULL3Reference:Check Point R81 VPN Administration Guide

asked 16/09/2024
Tom Rez
42 questions

Question 109

Report Export Collapse

Fill in the blank: To create policy for traffic to or from a particular location, use the _____________.

DLP shared policy
DLP shared policy
Geo policy shared policy
Geo policy shared policy
Mobile Access software blade
Mobile Access software blade
HTTPS inspection
HTTPS inspection
Suggested answer: B
Explanation:

The answer is B because Geo policy shared policy is used to create policy for traffic to or from a particular location based on the source or destination country. DLP shared policy is used to prevent data loss by inspecting files and data for sensitive information. Mobile Access software blade is used to provide secure remote access to corporate resources from various devices.HTTPS inspection is used to inspect encrypted web traffic for threats and compliance4

Reference:Check Point R81 Geo Policy Administration Guide, [Check Point R81 Data Loss Prevention Administration Guide], [Check Point R81 Mobile Access Administration Guide], [Check Point R81 HTTPS Inspection Administration Guide]

asked 16/09/2024
Shariifa DEME
35 questions

Question 110

Report Export Collapse

After trust has been established between the Check Point components, what is TRUE about name and IP-address changes?

Security Gateway IP-address cannot be changed without re-establishing the trust
Security Gateway IP-address cannot be changed without re-establishing the trust
The Security Gateway name cannot be changed in command line without re-establishing trust
The Security Gateway name cannot be changed in command line without re-establishing trust
The Security Management Server name cannot be changed in SmartConsole without re-establishing trust
The Security Management Server name cannot be changed in SmartConsole without re-establishing trust
The Security Management Server IP-address cannot be changed without re-establishing the trust
The Security Management Server IP-address cannot be changed without re-establishing the trust
Suggested answer: A
Explanation:

The answer is A because changing the Security Gateway IP-address requires re-establishing the trust with the Security Management Server by initializing the Secure Internal Communication (SIC). Changing the Security Gateway name in command line or changing the Security Management Server name or IP-address in SmartConsole does not require re-establishing the trust, but it may require updating the topology and pushing the policy.

Reference: [Check Point R81 Security Management Administration Guide], [Check Point R81 Security Gateway Administration Guide]

asked 16/09/2024
Artur Sierszen
54 questions
Total 401 questions
Go to page: of 41