ExamGecko
Home Home / Checkpoint / 156-215.81

Checkpoint 156-215.81 Practice Test - Questions Answers, Page 20

Question list
Search
Search

Which key is created during Phase 2 of a site-to-site VPN?

A.
Pre-shared secret
A.
Pre-shared secret
Answers
B.
Diffie-Hellman Public Key
B.
Diffie-Hellman Public Key
Answers
C.
Symmetrical IPSec key
C.
Symmetrical IPSec key
Answers
D.
Diffie-Hellman Private Key
D.
Diffie-Hellman Private Key
Answers
Suggested answer: C

Explanation:

The key that is created during Phase 2 of a site-to-site VPN is a symmetrical IPSec key3.This key is used to encrypt and decrypt the data that is exchanged between the VPN peers3.The symmetrical IPSec key is derived from the shared secret and the Diffie-Hellman public keys that are exchanged during Phase 13.

Reference:Site to Site VPN in R80.x - Tutorial for Beginners

Fill in the blank: Each cluster, at a minimum, should have at least ___________ interfaces.

A.
Five
A.
Five
Answers
B.
Two
B.
Two
Answers
C.
Three
C.
Three
Answers
D.
Four
D.
Four
Answers
Suggested answer: C

Explanation:

Each cluster, at a minimum, should have at least three interfaces4. These are:

Async interfacefor synchronizing state information between cluster members.

Acluster interfacefor sending and receiving cluster control packets.

Aproduction interfacefor handling regular traffic that passes through the cluster4.

Reference:Check Point R80.20 -- How to configure Cluster firewalls -- First Time Setup

Examine the sample Rule Base.

What will be the result of a verification of the policy from SmartConsole?

A.
No errors or Warnings
A.
No errors or Warnings
Answers
B.
Verification Error. Empty Source-List in Rule 5 (Mail Inbound)
B.
Verification Error. Empty Source-List in Rule 5 (Mail Inbound)
Answers
C.
Verification Error. Rule 4 (Web Inbound) hides Rule 6 (Webmaster access)
C.
Verification Error. Rule 4 (Web Inbound) hides Rule 6 (Webmaster access)
Answers
D.
Verification Error. Rule 7 (Clean-Up Rule) hides Implicit Clean-up Rule
D.
Verification Error. Rule 7 (Clean-Up Rule) hides Implicit Clean-up Rule
Answers
Suggested answer: C

Explanation:

Verification Error. Rule 4 (Web Inbound) hides Rule 6 (Webmaster access) is the correct answer. This is because Rule 4 has a broader source and destination than Rule 6, and both rules have the same service (HTTP). Therefore, Rule 6 will never be matched, and the Webmaster access will be denied.

Reference: Check Point R80.10 - Part 3 - Rule Base Order

You are the Check Point administrator for Alpha Corp. You received a call that one of the users is unable to browse the Internet on their new tablet which is connected to the company wireless, which goes through a Check Point Gateway. How would you review the logs to see what is blocking this traffic?

A.
Open SmartLog and connect remotely to the wireless controller
A.
Open SmartLog and connect remotely to the wireless controller
Answers
B.
Open SmartEvent to see why they are being blocked
B.
Open SmartEvent to see why they are being blocked
Answers
C.
Open SmartDashboard and review the logs tab
C.
Open SmartDashboard and review the logs tab
Answers
D.
From SmartConsole, go to the Log & Monitor and filter for the IP address of the tablet.
D.
From SmartConsole, go to the Log & Monitor and filter for the IP address of the tablet.
Answers
Suggested answer: D

Explanation:

From SmartConsole, go to the Log & Monitor and filter for the IP address of the tablet is the correct answer. This is because the Log & Monitor view in SmartConsole allows you to view and analyze logs and events from various sources, such as Security Gateways, Security Management Servers, and SmartEvent Servers. You can use filters to search for specific logs and events based on different criteria, such as source IP, destination IP, action, time, etc.

Reference: [Logging and Monitoring Administration Guide R80.20]

What is a role of Publishing?

A.
The Publish operation sends the modifications made via SmartConsole in the private session and makes them public
A.
The Publish operation sends the modifications made via SmartConsole in the private session and makes them public
Answers
B.
The Security Management Server installs the updated policy and the entire database on Security Gateways
B.
The Security Management Server installs the updated policy and the entire database on Security Gateways
Answers
C.
The Security Management Server installs the updated session and the entire Rule Base on Security Gateways
C.
The Security Management Server installs the updated session and the entire Rule Base on Security Gateways
Answers
D.
Modifies network objects, such as servers, users, services, or IPS profiles, but not the Rule Base
D.
Modifies network objects, such as servers, users, services, or IPS profiles, but not the Rule Base
Answers
Suggested answer: A

Explanation:

The Publish operation sends the modifications made via SmartConsole in the private session and makes them public is the correct answer. This is because publishing is the process of saving your changes to the database and making them available to other administrators. Publishing also allows you to install policies on Security Gateways.

Reference: [Publishing Changes]

Which software blade enables Access Control policies to accept, drop, or limit web site access based on user, group, and/or machine?

A.
Application Control
A.
Application Control
Answers
B.
Data Awareness
B.
Data Awareness
Answers
C.
Identity Awareness
C.
Identity Awareness
Answers
D.
Threat Emulation
D.
Threat Emulation
Answers
Suggested answer: A

Explanation:

Application Control is the software blade that enables Access Control policies to accept, drop, or limit web site access based on user, group, and/or machine. Application Control allows you to define granular rules for applications, web sites, web categories, web content types, and users. You can also use Application Control to monitor and block risky applications and web usage.

Reference: [Application Control Administration Guide R80.40]

Fill in the blank: ____________ is the Gaia command that turns the server off.

A.
sysdown
A.
sysdown
Answers
B.
exit
B.
exit
Answers
C.
halt
C.
halt
Answers
D.
shut-down
D.
shut-down
Answers
Suggested answer: C

Explanation:

halt is the Gaia command that turns the server off. This command shuts down the operating system and powers off the machine. Other commands that can be used to shut down the server are shutdown and poweroff.

Reference: [Gaia Administration Guide R80.40]

Which option in a firewall rule would only match and allow traffic to VPN gateways for one Community in common?

A.
All Connections (Clear or Encrypted)
A.
All Connections (Clear or Encrypted)
Answers
B.
Accept all encrypted traffic
B.
Accept all encrypted traffic
Answers
C.
Specific VPN Communities
C.
Specific VPN Communities
Answers
D.
All Site-to-Site VPN Communities
D.
All Site-to-Site VPN Communities
Answers
Suggested answer: C

Explanation:

Specific VPN Communities is the option that would only match and allow traffic to VPN gateways for one Community in common. This option allows you to define a specific VPN community that includes the VPN gateways that are allowed to communicate with each other. The other options are either too broad or too narrow for this scenario.

Reference: [Site to Site VPN in R80.x - Tutorial for Beginners]

Which SmartConsole tab is used to monitor network and security performance?

A.
Manage & Settings
A.
Manage & Settings
Answers
B.
Security Policies
B.
Security Policies
Answers
C.
Gateway & Servers
C.
Gateway & Servers
Answers
D.
Logs & Monitor
D.
Logs & Monitor
Answers
Suggested answer: D

Explanation:

Logs & Monitor is the SmartConsole tab that is used to monitor network and security performance. This tab allows you to view and analyze logs and events from various sources, such as Security Gateways, Security Management Servers, and SmartEvent Servers. You can also use this tab to generate reports and troubleshoot issues.

Reference: [Logging and Monitoring Administration Guide R80.20]

Which of the following is NOT a policy type available for each policy package?

A.
Threat Emulation
A.
Threat Emulation
Answers
B.
Access Control
B.
Access Control
Answers
C.
Desktop Security
C.
Desktop Security
Answers
D.
Threat Prevention
D.
Threat Prevention
Answers
Suggested answer: A
Total 401 questions
Go to page: of 41