ExamGecko
Home Home / Checkpoint / 156-215.81

Checkpoint 156-215.81 Practice Test - Questions Answers, Page 13

Question list
Search
Search

From the Gaia web interface, which of the following operations CANNOT be performed on a Security Management Server?

A.
Verify a Security Policy
A.
Verify a Security Policy
Answers
B.
Open a terminal shell
B.
Open a terminal shell
Answers
C.
Add a static route
C.
Add a static route
Answers
D.
View Security Management GUI Clients
D.
View Security Management GUI Clients
Answers
Suggested answer: A

Explanation:

From the Gaia web interface, the operation that CANNOT be performed on a Security Management Server is Verify a Security Policy.This operation can only be done from SmartConsole4.

Reference:Check Point R81 SmartConsole Online Help

Which of the following are types of VPN communities?

A.
Pentagon, star, and combination
A.
Pentagon, star, and combination
Answers
B.
Star, octagon, and combination
B.
Star, octagon, and combination
Answers
C.
Combined and star
C.
Combined and star
Answers
D.
Meshed, star, and combination
D.
Meshed, star, and combination
Answers
Suggested answer: D

Explanation:

The types of VPN communities are Meshed, Star, and Combination. A Meshed community is a group of Security Gateways that have VPN connections between every pair of members. A Star community has one Security Gateway as the center and other Security Gateways or hosts as satellites. A Combination community is a group of Meshed and Star communities.

Reference: [Check Point R81 Site-to-Site VPN Administration Guide]

What are the three types of UserCheck messages?

A.
inform, ask, and block
A.
inform, ask, and block
Answers
B.
block, action, and warn
B.
block, action, and warn
Answers
C.
action, inform, and ask
C.
action, inform, and ask
Answers
D.
ask, block, and notify
D.
ask, block, and notify
Answers
Suggested answer: A

Explanation:

The three types of UserCheck messages are inform, ask, and block. Inform messages notify users about security events and do not require any user action. Ask messages prompt users to choose whether to allow or block an action.Block messages prevent users from performing an action and display a reason1.

Reference:Check Point R81 Logging and Monitoring Administration Guide

What two ordered layers make up the Access Control Policy Layer?

A.
URL Filtering and Network
A.
URL Filtering and Network
Answers
B.
Network and Threat Prevention
B.
Network and Threat Prevention
Answers
C.
Application Control and URL Filtering
C.
Application Control and URL Filtering
Answers
D.
Network and Application Control
D.
Network and Application Control
Answers
Suggested answer: B

Explanation:

The two ordered layers that make up the Access Control Policy Layer are Network and Threat Prevention. Network layer contains rules that define how traffic is inspected and handled by the Security Gateway.Threat Prevention layer contains rules that define how traffic is inspected by the Threat Prevention Software Blades2.

Reference:Check Point R81 Security Management Administration Guide

Which statement is TRUE of anti-spoofing?

A.
Anti-spoofing is not needed when IPS software blade is enabled
A.
Anti-spoofing is not needed when IPS software blade is enabled
Answers
B.
It is more secure to create anti-spoofing groups manually
B.
It is more secure to create anti-spoofing groups manually
Answers
C.
It is BEST Practice to have anti-spoofing groups in sync with the routing table
C.
It is BEST Practice to have anti-spoofing groups in sync with the routing table
Answers
D.
With dynamic routing enabled, anti-spoofing groups are updated automatically whenever there is a routing change
D.
With dynamic routing enabled, anti-spoofing groups are updated automatically whenever there is a routing change
Answers
Suggested answer: C

Explanation:

The statement that is TRUE of anti-spoofing is that it is BEST Practice to have anti-spoofing groups in sync with the routing table. Anti-spoofing prevents attackers from sending packets with a false source IP address. Anti-spoofing groups define which IP addresses are expected on each interface of the Security Gateway.If the routing table changes, the anti-spoofing groups should be updated accordingly34.

Reference:Check Point R81 ClusterXL Administration Guide,Network Defined by Routes: Anti-Spoofing

After the initial installation on Check Point appliance, you notice that the Management interface and default gateway are incorrect. Which commands could you use to set the IP to 192.168.80.200/24 and default gateway to 192.168.80.1.

A.
set interface Mgmt ipv4-address 192.168.80.200 mask-length 24set static-route default nexthop gateway address 192.168.80.1 onsave config
A.
set interface Mgmt ipv4-address 192.168.80.200 mask-length 24set static-route default nexthop gateway address 192.168.80.1 onsave config
Answers
B.
add interface Mgmt ipv4-address 192.168.80.200 255.255.255.0add static-route 0.0.0.0.0.0.0.0 gw 192.168.80.1 onsave config
B.
add interface Mgmt ipv4-address 192.168.80.200 255.255.255.0add static-route 0.0.0.0.0.0.0.0 gw 192.168.80.1 onsave config
Answers
C.
set interface Mgmt ipv4-address 192.168.80.200 255.255.255.0add static-route 0.0.0.0.0.0.0.0 gw 192.168.80.1 onsave config
C.
set interface Mgmt ipv4-address 192.168.80.200 255.255.255.0add static-route 0.0.0.0.0.0.0.0 gw 192.168.80.1 onsave config
Answers
D.
add interface Mgmt ipv4-address 192.168.80.200 mask-length 24add static-route default nexthop gateway address 192.168.80.1 onsave config
D.
add interface Mgmt ipv4-address 192.168.80.200 mask-length 24add static-route default nexthop gateway address 192.168.80.1 onsave config
Answers
Suggested answer: A

Explanation:

The commands you could use to set the IP to 192.168.80.200/24 and default gateway to 192.168.80.1 after the initial installation on Check Point appliance are:

set interface Mgmt ipv4-address 192.168.80.200 mask-length 24. This command sets the IPv4 address and subnet mask of the Management interface.

set static-route default nexthop gateway address 192.168.80.1 on. This command sets the default gateway for IPv4 routing.

save config. This command saves the configuration changes.

What Check Point tool is used to automatically update Check Point products for the Gaia OS?

A.
Check Point INSPECT Engine
A.
Check Point INSPECT Engine
Answers
B.
Check Point Upgrade Service Engine
B.
Check Point Upgrade Service Engine
Answers
C.
Check Point Update Engine
C.
Check Point Update Engine
Answers
D.
Check Point Upgrade Installation Service
D.
Check Point Upgrade Installation Service
Answers
Suggested answer: B

Explanation:

The Check Point Upgrade Service Engine (CPUSE) is a tool that automates the process of upgrading and installing Check Point products on Gaia OS1.It can also be used to update the Gaia OS itself2. The other options are not valid tools for this purpose.

Reference:Check Point Upgrade Service Engine (CPUSE) - Gaia Deployment Agent,Check Point R81 Gaia Installation and Upgrade Guide

You are the Check Point administrator for Alpha Corp with an R80 Check Point estate. You have received a call by one of the management users stating that they are unable to browse the Internet with their new tablet connected to the company Wireless. The Wireless system goes through the Check Point Gateway. How do you review the logs to see what the problem may be?

A.
Open SmartLog and connect remotely to the IP of the wireless controller
A.
Open SmartLog and connect remotely to the IP of the wireless controller
Answers
B.
Open SmartView Tracker and filter the logs for the IP address of the tablet
B.
Open SmartView Tracker and filter the logs for the IP address of the tablet
Answers
C.
Open SmartView Tracker and check all the IP logs for the tablet
C.
Open SmartView Tracker and check all the IP logs for the tablet
Answers
D.
Open SmartLog and query for the IP address of the Manager's tablet
D.
Open SmartLog and query for the IP address of the Manager's tablet
Answers
Suggested answer: D

Explanation:

SmartLog is a unified log viewer that provides fast and easy access to logs from all Check Point components3.It allows the administrator to query for any log field, such as the IP address of the tablet, and filter the results by time, severity, blade, action, and more4. SmartView Tracker is a legacy tool that displays network activity logs from Security Gateways and other Check Point devices. It does not support remote connection to the wireless controller or querying for specific IP addresses.

Reference:SmartLog,SmartLog Queries, [SmartView Tracker]

What are the advantages of a ''shared policy'' in R80?

A.
Allows the administrator to share a policy between all the users identified by the Security Gateway
A.
Allows the administrator to share a policy between all the users identified by the Security Gateway
Answers
B.
Allows the administrator to share a policy between all the administrators managing the Security Management Server
B.
Allows the administrator to share a policy between all the administrators managing the Security Management Server
Answers
C.
Allows the administrator to share a policy so that it is available to use in another Policy Package
C.
Allows the administrator to share a policy so that it is available to use in another Policy Package
Answers
D.
Allows the administrator to install a policy on one Security Gateway and it gets installed on another managed Security Gateway
D.
Allows the administrator to install a policy on one Security Gateway and it gets installed on another managed Security Gateway
Answers
Suggested answer: C

Explanation:

A shared policy is a set of rules that can be used in multiple policy packages. It allows the administrator to create a common security policy for different gateways or domains, and avoid duplication and inconsistency. The other options are not advantages of a shared policy.

Reference: [Shared Policies Overview], [Shared Policies Best Practices]

To view statistics on detected threats, which Threat Tool would an administrator use?

A.
Protections
A.
Protections
Answers
B.
IPS Protections
B.
IPS Protections
Answers
C.
Profiles
C.
Profiles
Answers
D.
ThreatWiki
D.
ThreatWiki
Answers
Suggested answer: D

Explanation:

ThreatWiki is a web-based tool that provides statistics on detected threats, such as attack types, sources, destinations, and severity. It also allows the administrator to search for specific threats and view their details and mitigation methods. The other options are not tools for viewing statistics on detected threats.

Reference: [ThreatWiki], [ThreatWiki - Threat Emulation]

Total 401 questions
Go to page: of 41