ExamGecko
Home Home / Checkpoint / 156-215.81

Checkpoint 156-215.81 Practice Test - Questions Answers, Page 23

Question list
Search
Search

Fill in the blank: When LDAP is integrated with Check Point Security Management, it is then referred to as _______.

A.
User Center
A.
User Center
Answers
B.
User Administration
B.
User Administration
Answers
C.
User Directory
C.
User Directory
Answers
D.
UserCheck
D.
UserCheck
Answers
Suggested answer: C

Explanation:

When LDAP is integrated with Check Point Security Management, it is then referred to as User Directory. User Directory is a feature that allows you to import users and groups from an external LDAP server and use them in your security policies. User Center, User Administration, and UserCheck are different features that are not related to LDAP integration.

Reference: [User Directory], [LDAP Integration]

Can you use the same layer in multiple policies or rulebases?

A.
Yes - a layer can be shared with multiple policies and rules.
A.
Yes - a layer can be shared with multiple policies and rules.
Answers
B.
No - each layer must be unique.
B.
No - each layer must be unique.
Answers
C.
No - layers cannot be shared or reused, but an identical one can be created.
C.
No - layers cannot be shared or reused, but an identical one can be created.
Answers
D.
Yes - but it must be copied and pasted with a different name.
D.
Yes - but it must be copied and pasted with a different name.
Answers
Suggested answer: A

Explanation:

You can use the same layer in multiple policies or rulebases. A layer is a set of rules that can be shared, reused, or inherited by different policies. This allows you to create modular and flexible security policies that can be applied to different scenarios.

Reference: [Layers], [Policy Layers and Sub-Policies]

Security Gateway software blades must be attached to what?

A.
Security Gateway
A.
Security Gateway
Answers
B.
Security Gateway container
B.
Security Gateway container
Answers
C.
Management server
C.
Management server
Answers
D.
Management container
D.
Management container
Answers
Suggested answer: B

Explanation:

Security Gateway software blades must be attached to a Security Gateway container. A Security Gateway container is a logical object that represents a physical or virtual machine that runs the Security Gateway software. A software blade is a modular security feature that can be enabled or disabled eway container. A software blade can provide functions such as firewall, VPN, IPS, anti-virus, anti-bot, application control, URL filtering, etc.

Reference: [Security Gateway Containers], [Software Blades]

Which tool allows you to monitor the top bandwidth on smart console?

A.
Logs & Monitoring
A.
Logs & Monitoring
Answers
B.
Smart Event
B.
Smart Event
Answers
C.
Gateways & Severs Tab
C.
Gateways & Severs Tab
Answers
D.
SmartView Monitor
D.
SmartView Monitor
Answers
Suggested answer: D

Explanation:

SmartView Monitor is the tool that allows you to monitor the top bandwidth on SmartConsole. SmartView Monitor is a graphical tool that displays real-time network and security performance data, such as traffic, throughput, connections, CPU usage, memory usage, etc. You can use SmartView Monitor to identify the top bandwidth consumers and optimize your network performance.

Reference: [SmartView Monitor], [Monitoring Network Traffic]

A security zone is a group of one or more network interfaces from different centrally managed gateways. What is considered part of the zone?

A.
The zone is based on the network topology and determined according to where the interface leads to.
A.
The zone is based on the network topology and determined according to where the interface leads to.
Answers
B.
Security Zones are not supported by Check Point firewalls.
B.
Security Zones are not supported by Check Point firewalls.
Answers
C.
The firewall rule can be configured to include one or more subnets in a zone.
C.
The firewall rule can be configured to include one or more subnets in a zone.
Answers
D.
The local directly connected subnet defined by the subnet IP and subnet mask.
D.
The local directly connected subnet defined by the subnet IP and subnet mask.
Answers
Suggested answer: A

Explanation:

A security zone is a group of one or more network interfaces from different centrally managed gateways that have the same security requirements. The zone is based on the network topology and determined according to where the interface leads to. For example, a zone can be defined as internal, external, DMZ, VPN, etc. Security zones are supported by Check Point firewalls and can be used to simplify security policies and network segmentation. The firewall rule can be configured to include one or more zones as source or destination objects. The local directly connected subnet defined by the subnet IP and subnet mask is not considered part of the zone, but rather a property of the interface.

Reference: [Security Zones], [Security Zones Best Practices]

When comparing Stateful Inspection and Packet Filtering, what is a benefit that Stateful Inspection offers over Packer Filtering?

A.
Stateful Inspection offers unlimited connections because of virtual memory usage.
A.
Stateful Inspection offers unlimited connections because of virtual memory usage.
Answers
B.
Stateful Inspection offers no benefits over Packet Filtering.
B.
Stateful Inspection offers no benefits over Packet Filtering.
Answers
C.
Stateful Inspection does not use memory to record the protocol used by the connection.
C.
Stateful Inspection does not use memory to record the protocol used by the connection.
Answers
D.
Only one rule is required for each connection.
D.
Only one rule is required for each connection.
Answers
Suggested answer: D

Explanation:

Stateful Inspection is a firewall technology that inspects both the header and the payload of each packet and keeps track of the state and context of each connection. Packet Filtering is a firewall technology that inspects only the header of each packet and does not keep track of the state or context of each connection. A benefit that Stateful Inspection offers over Packet Filtering is that only one rule is required for each connection, whereas Packet Filtering requires two rules for each connection (one for each direction). Stateful Inspection also offers other benefits over Packet Filtering, such as enhanced security, performance, and flexibility. Stateful Inspection does not offer unlimited connections because of virtual memory usage, nor does it avoid using memory to record the protocol used by the connection.

Reference: [Stateful Inspection], [Packet Filtering], [Firewall Technologies]

Fill in the blanks: Gaia can be configured using _______ the ________.

A.
Command line interface; WebUI
A.
Command line interface; WebUI
Answers
B.
Gaia Interface; GaiaUI
B.
Gaia Interface; GaiaUI
Answers
C.
WebUI; Gaia Interface
C.
WebUI; Gaia Interface
Answers
D.
GaiaUI; command line interface
D.
GaiaUI; command line interface
Answers
Suggested answer: A

Explanation:

Gaia can be configured using the command line interface (CLI) or the WebUI. The CLI is a text-based interface that allows you to configure and manage Gaia settings using commands and scripts. The WebUI is a graphical interface that allows you to configure and manage Gaia settings using a web browser. Gaia Interface and GaiaUI are not valid terms for Gaia configuration tools.

Reference: [Gaia Administration Guide], [Gaia Overview]

An administrator can use section titles to more easily navigate between large rule bases. Which of these statements is FALSE?

A.
Section titles are not sent to the gateway side.
A.
Section titles are not sent to the gateway side.
Answers
B.
These sections are simple visual divisions of the Rule Base and do not hinder the order of rule enforcement.
B.
These sections are simple visual divisions of the Rule Base and do not hinder the order of rule enforcement.
Answers
C.
A Sectional Title can be used to disable multiple rules by disabling only the sectional title.
C.
A Sectional Title can be used to disable multiple rules by disabling only the sectional title.
Answers
D.
Sectional Titles do not need to be created in the SmartConsole.
D.
Sectional Titles do not need to be created in the SmartConsole.
Answers
Suggested answer: C

Explanation:

The statement that a Sectional Title can be used to disable multiple rules by disabling only the sectional title is false. A Sectional Title is a visual divider that helps organize and navigate large rule bases. It does not affect the rule enforcement order or the rule functionality. Disabling a Sectional Title does not disable the rules under it. To disable multiple rules, you need to select them individually or use Shift+Click or Ctrl+Click to select them in bulk, and then right-click and choose Disable Rule(s). The other statements are true. Section titles are not sent to the gateway side, they are only displayed in SmartConsole. These sections are simple visual divisions of the Rule Base and do not hinder the order of rule enforcement. Sectional Titles do not need to be created in SmartConsole, they can also be created using SmartConsole CLI or API commands.

Reference: [Sectional Titles], [SmartConsole CLI Guide], [SmartConsole API Reference Guide]

A stateful inspection firewall works by registering connection data and compiling this information. Where is the information stored?

A.
In the system SMEM memory pool.
A.
In the system SMEM memory pool.
Answers
B.
In State tables.
B.
In State tables.
Answers
C.
In the Sessions table.
C.
In the Sessions table.
Answers
D.
In a CSV file on the firewall hard drive located in $FWDIR/conf/.
D.
In a CSV file on the firewall hard drive located in $FWDIR/conf/.
Answers
Suggested answer: B

Explanation:

A stateful inspection firewall works by registering connection data and compiling this information in state tables. State tables are data structures that store information about the state and context of each connection, such as source, destination, service, protocol, sequence number, flags, etc. State tables enable the firewall to inspect both the header and the payload of each packet and apply security policies accordingly.

Reference: [Stateful Inspection], [State Tables]

What is the RFC number that act as a best practice guide for NAT?

A.
RFC 1939
A.
RFC 1939
Answers
B.
RFC 1950
B.
RFC 1950
Answers
C.
RFC 1918
C.
RFC 1918
Answers
D.
RFC 793
D.
RFC 793
Answers
Suggested answer: C

Explanation:

The RFC number that acts as a best practice guide for NAT is RFC 1918. RFC 1918 defines a range of private IP addresses that are not globally routable and can be used for internal networks. NAT is a technique that maps these private IP addresses to public IP addresses that can communicate with the Internet. RFC 1918 provides guidelines and recommendations for using NAT in different scenarios and environments.

Reference: [RFC 1918], [Network Address Translation (NAT)]

Total 401 questions
Go to page: of 41