ExamGecko
Home Home / Checkpoint / 156-215.81

Checkpoint 156-215.81 Practice Test - Questions Answers, Page 16

Question list
Search
Search

Which icon in the WebUI indicates that read/write access is enabled?

A.
Pencil
A.
Pencil
Answers
B.
Padlock
B.
Padlock
Answers
C.
Book
C.
Book
Answers
D.
Eyeglasses
D.
Eyeglasses
Answers
Suggested answer: A

Explanation:

The icon in the WebUI that indicates that read/write access is enabled is thePencilicon . The Pencil icon appears next to the name of the device when it is in Read/Write mode, which allows making changes to the configuration. The Padlock icon indicates that read-only access is enabled, which prevents making changes to the configuration. The Book icon indicates that online help is available, which provides information and guidance on using the WebUI. The Eyeglasses icon indicates that a view-only mode is enabled, which allows viewing the configuration without logging in.

What is NOT an advantage of Stateful Inspection?

A.
High Performance
A.
High Performance
Answers
B.
Good Security
B.
Good Security
Answers
C.
No Screening above Network layer
C.
No Screening above Network layer
Answers
D.
Transparency
D.
Transparency
Answers
Suggested answer: C

Explanation:

The option that is NOT an advantage of Stateful Inspection isNo Screening above Network layer. Stateful Inspection is a firewall technology that inspects packets at all layers of the OSI model, from layer 3 (Network) to layer 7 (Application). Stateful Inspection provides screening above Network layer, such as checking TCP flags, sequence numbers, ports, and application protocols . The other options are advantages of Stateful Inspection, as it provides high performance, good security, and transparency for legitimate traffic.

Which of the following Windows Security Events will NOT map a username to an IP address in Identity Awareness?

A.
Kerberos Ticket Renewed
A.
Kerberos Ticket Renewed
Answers
B.
Kerberos Ticket Requested
B.
Kerberos Ticket Requested
Answers
C.
Account Logon
C.
Account Logon
Answers
D.
Kerberos Ticket Timed Out
D.
Kerberos Ticket Timed Out
Answers
Suggested answer: D

Explanation:

The Windows Security Event that will NOT map a username to an IP address in Identity Awareness isKerberos Ticket Timed Out. This event occurs when a Kerberos ticket expires and is not renewed, which means that the user is no longer active on the network. Identity Awareness does not use this event to map a username to an IP address, as it does not indicate a valid user session. The other events are used by Identity Awareness to map a username to an IP address, as they indicate a successful user authentication or activity on the network.

Fill in the blank: Permanent VPN tunnels can be set on all tunnels in the community, on all tunnels for specific gateways, or__________.

A.
On all satellite gateway to satellite gateway tunnels
A.
On all satellite gateway to satellite gateway tunnels
Answers
B.
On specific tunnels for specific gateways
B.
On specific tunnels for specific gateways
Answers
C.
On specific tunnels in the community
C.
On specific tunnels in the community
Answers
D.
On specific satellite gateway to central gateway tunnels
D.
On specific satellite gateway to central gateway tunnels
Answers
Suggested answer: C

Explanation:

Permanent VPN tunnels can be set on all tunnels in the community, on all tunnels for specific gateways, oron specific tunnels in the community. This option allows the administrator to select which tunnels should be permanent and which should be established on demand. The other options are not valid, as they do not match the available choices in the VPN community settings.

In Unified SmartConsole Gateways and Servers tab you can perform the following functions EXCEPT ________.

A.
Upgrade the software version
A.
Upgrade the software version
Answers
B.
Open WebUI
B.
Open WebUI
Answers
C.
Open SSH
C.
Open SSH
Answers
D.
Open service request with Check Point Technical Support
D.
Open service request with Check Point Technical Support
Answers
Suggested answer: C

Explanation:

The function that can NOT be performed in the Unified SmartConsole Gateways and Servers tab isOpen SSH. SSH is a secure shell protocol that allows remote access to a device via command line interface. The Unified SmartConsole does not provide an option to open SSH from the Gateways and Servers tab, as it is not a graphical user interface. The other functions can be performed in the Unified SmartConsole Gateways and Servers tab, such as upgrading the software version, opening WebUI, or opening service request with Check Point Technical Support.

Which Threat Prevention Software Blade provides protection from malicious software that can infect your network computers? (Choose the best answer.)

A.
IPS
A.
IPS
Answers
B.
Anti-Virus
B.
Anti-Virus
Answers
C.
Anti-Malware
C.
Anti-Malware
Answers
D.
Content Awareness
D.
Content Awareness
Answers
Suggested answer: B

Explanation:

The Threat Prevention Software Blade that provides protection from malicious software that can infect your network computers isAnti-Virus. Anti-Virus is a software blade that scans files and traffic for viruses, worms, trojans, spyware, and other malware. Anti-Virus can block or clean infected files and prevent malware outbreaks. IPS is a software blade that provides protection from network attacks and exploits. Anti-Malware is not a software blade, but rather a term that refers to any software that can detect and remove malware. Content Awareness is a software blade that provides visibility and control over data that enters or leaves the network based on file types, data types, and keywords.

When configuring Spoof Tracking, which tracking actions can an administrator select to be done when spoofed packets are detected?

A.
Log, send snmp trap, email
A.
Log, send snmp trap, email
Answers
B.
Drop packet, alert, none
B.
Drop packet, alert, none
Answers
C.
Log, alert, none
C.
Log, alert, none
Answers
D.
Log, allow packets, email
D.
Log, allow packets, email
Answers
Suggested answer: C

Explanation:

The tracking actions that can be selected when configuring Spoof Tracking areLog, alert, none. Spoof Tracking is a feature that detects packets with spoofed source IP addresses and logs them in SmartView Tracker. The administrator can choose to log only, log and alert, or do nothing when spoofed packets are detected. The other options are not valid tracking actions for Spoof Tracking, as they are either not available or not relevant for this feature.

Access roles allow the firewall administrator to configure network access according to:

A.
remote access clients.
A.
remote access clients.
Answers
B.
a combination of computer or computer groups and networks.
B.
a combination of computer or computer groups and networks.
Answers
C.
users and user groups.
C.
users and user groups.
Answers
D.
All of the above.
D.
All of the above.
Answers
Suggested answer: D

Explanation:

Access roles allow the firewall administrator to configure network access according to remote access clients, a combination of computer or computer groups and networks, and users and user groups12. Therefore, the correct answer is D.

Which tool is used to enable ClusterXL?

A.
SmartUpdate
A.
SmartUpdate
Answers
B.
cpconfig
B.
cpconfig
Answers
C.
SmartConsole
C.
SmartConsole
Answers
D.
sysconfig
D.
sysconfig
Answers
Suggested answer: B

Explanation:

The tool that is used to enable ClusterXL is cpconfig.ClusterXL is a software-based Load Sharing and High Availability solution that distributes network traffic between clusters of redundant Security Gateways1.To enable ClusterXL, you need to run the cpconfig command on each cluster member and select Enable Cluster membership for this gateway2. Therefore, the correct answer is B.cpconfig.

What type of NAT is a one-to-one relationship where each host is translated to a unique address?

A.
Source
A.
Source
Answers
B.
Static
B.
Static
Answers
C.
Hide
C.
Hide
Answers
D.
Destination
D.
Destination
Answers
Suggested answer: B

Explanation:

The type of NAT that is a one-to-one relationship where each host is translated to a unique address is Static NAT.Static NAT maps an unregistered IP address to a registered IP address on a one-to-one basis3.This means that for each internal host, there is a corresponding external address that represents it3. Therefore, the correct answer is B

Total 401 questions
Go to page: of 41