ExamGecko
Home Home / Checkpoint / 156-215.81

Checkpoint 156-215.81 Practice Test - Questions Answers, Page 25

Question list
Search
Search

What is the default shell for the command line interface?

A.
Clish
A.
Clish
Answers
B.
Admin
B.
Admin
Answers
C.
Normal
C.
Normal
Answers
D.
Expert
D.
Expert
Answers
Suggested answer: A

Explanation:

Clish is the default shell for the command line interface. It is a user-friendly shell that provides a menu-based and a command-line mode.Admin, Normal, and Expert are not valid shell names1.

When configuring Anti-Spoofing, which tracking options can an Administrator select?

A.
Log, Alert, None
A.
Log, Alert, None
Answers
B.
Log, Allow Packets, Email
B.
Log, Allow Packets, Email
Answers
C.
Drop Packet, Alert, None
C.
Drop Packet, Alert, None
Answers
D.
Log, Send SNMP Trap, Email
D.
Log, Send SNMP Trap, Email
Answers
Suggested answer: A

Explanation:

Log, Alert, and None are the tracking options that an Administrator can select when configuring Anti-Spoofing. Log means that the packet will be logged in SmartView Tracker. Alert means that the packet will trigger an alert in SmartView Monitor.None means that no action will be taken2. The other options are not valid tracking options.

Which of the following log queries would show only dropped packets with source address of 192.168.1.1 and destination address of 172.26.1.1?

A.
src:192.168.1.1 OR dst:172.26.1.1 AND action:Drop
A.
src:192.168.1.1 OR dst:172.26.1.1 AND action:Drop
Answers
B.
src:192.168.1.1 AND dst:172.26.1.1 AND action:Drop
B.
src:192.168.1.1 AND dst:172.26.1.1 AND action:Drop
Answers
C.
192.168.1.1 AND 172.26.1.1 AND drop
C.
192.168.1.1 AND 172.26.1.1 AND drop
Answers
D.
192.168.1.1 OR 172.26.1.1 AND action:Drop
D.
192.168.1.1 OR 172.26.1.1 AND action:Drop
Answers
Suggested answer: B

Explanation:

src:192.168.1.1 AND dst:172.26.1.1 AND action:Drop is the correct log query to show only dropped packets with source address of 192.168.1.1 and destination address of 172.26.1.1. The AND operator means that all conditions must be true for the query to match.The OR operator means that any condition can be true for the query to match3. The other queries will either show packets that are not dropped or packets that have different source or destination addresses.

Core Protections are installed as part of what Policy?

A.
Access Control Policy.
A.
Access Control Policy.
Answers
B.
Desktop Firewall Policy
B.
Desktop Firewall Policy
Answers
C.
Mobile Access Policy.
C.
Mobile Access Policy.
Answers
D.
Threat Prevention Policy.
D.
Threat Prevention Policy.
Answers
Suggested answer: D

Explanation:

Core Protections are installed as part of the Threat Prevention Policy.Core Protections are a set of IPS protections that are essential for securing your network against malicious traffic4. The other policies do not include Core Protections.

In HTTPS Inspection policy, what actions are available in the 'Actions' column of a rule?

A.
'Inspect', 'Bypass'
A.
'Inspect', 'Bypass'
Answers
B.
'Inspect', 'Bypass', 'Categorize'
B.
'Inspect', 'Bypass', 'Categorize'
Answers
C.
'Inspect', 'Bypass', 'Block'
C.
'Inspect', 'Bypass', 'Block'
Answers
D.
'Detect', 'Bypass'
D.
'Detect', 'Bypass'
Answers
Suggested answer: A

Explanation:

The actions available in the ''Actions'' column of a rule in HTTPS Inspection policy are ''Inspect'' and ''Bypass''. ''Inspect'' means that the HTTPS traffic will be decrypted and inspected according to the Access Control policy.''Bypass'' means that the HTTPS traffic will not be decrypted and will be allowed without inspection1. The other options are not valid actions for HTTPS Inspection policy.

Fill in the blank: Browser-based Authentication sends users to a web page to acquire identities using ___________.

A.
Captive Portal and Transparent Kerberos Authentication
A.
Captive Portal and Transparent Kerberos Authentication
Answers
B.
UserCheck
B.
UserCheck
Answers
C.
User Directory
C.
User Directory
Answers
D.
Captive Portal
D.
Captive Portal
Answers
Suggested answer: A

Explanation:

Browser-based Authentication sends users to a web page to acquire identities using Captive Portal and Transparent Kerberos Authentication. Captive Portal is a web page that prompts users to enter their credentials.Transparent Kerberos Authentication is a method that automatically authenticates users who have a valid Kerberos ticket from the Active Directory domain controller2. UserCheck is a feature that allows users to interact with the security policy, not a method of authentication. User Directory is a component that integrates with external user databases, not a web page for authentication. Captive Portal alone is not enough to fill in the blank, as it is only one of the methods used by Browser-based Authentication.

With URL Filtering, what portion of the traffic is sent to the Check Point Online Web Service for analysis?

A.
The complete communication is sent for inspection.
A.
The complete communication is sent for inspection.
Answers
B.
The IP address of the source machine.
B.
The IP address of the source machine.
Answers
C.
The end user credentials.
C.
The end user credentials.
Answers
D.
The host portion of the URL.
D.
The host portion of the URL.
Answers
Suggested answer: D

Explanation:

With URL Filtering, only the host portion of the URL is sent to the Check Point Online Web Service for analysis. The host portion is the part of the URL that identifies the web server, such as www.example.com.The Check Point Online Web Service uses this information to categorize the URL and return the appropriate action to the Security Gateway3. The other options are not sent to the Check Point Online Web Service for analysis, as they may contain sensitive or irrelevant data.

Choose what BEST describes the reason why querying logs now are very fast.

A.
The amount of logs being stored is less than previous versions.
A.
The amount of logs being stored is less than previous versions.
Answers
B.
New Smart-1 appliances double the physical memory install.
B.
New Smart-1 appliances double the physical memory install.
Answers
C.
Indexing Engine indexes logs for faster search results.
C.
Indexing Engine indexes logs for faster search results.
Answers
D.
SmartConsole now queries results directly from the Security Gateway.
D.
SmartConsole now queries results directly from the Security Gateway.
Answers
Suggested answer: C

Explanation:

The reason why querying logs now are very fast is that Indexing Engine indexes logs for faster search results.Indexing Engine is a component of R81 Management that creates and maintains an index of log data, which enables quick and efficient log searches4. The other options are not related to the speed of log querying. The amount of logs being stored may vary depending on the log retention settings. New Smart-1 appliances may have improved hardware specifications, but they do not affect the log querying process directly. SmartConsole queries results from the Security Management Server, not from the Security Gateway.

Rugged appliances are small appliances with ruggedized hardware and like Quantum Spark appliance they use which operating system?

A.
Centos Linux
A.
Centos Linux
Answers
B.
Gaia embedded
B.
Gaia embedded
Answers
C.
Gaia
C.
Gaia
Answers
D.
Red Hat Enterprise Linux version 5
D.
Red Hat Enterprise Linux version 5
Answers
Suggested answer: B

Explanation:

Rugged appliances are small appliances with ruggedized hardware and like Quantum Spark appliance they use Gaia embedded as the operating system.Gaia embedded is a lightweight version of Gaia that is designed for small and medium businesses1. Centos Linux, Gaia, and Red Hat Enterprise Linux version 5 are not the operating systems used by Rugged appliances.

Which application is used for the central management and deployment of licenses and packages?

A.
SmartProvisioning
A.
SmartProvisioning
Answers
B.
SmartLicense
B.
SmartLicense
Answers
C.
SmartUpdate
C.
SmartUpdate
Answers
D.
Deployment Agent
D.
Deployment Agent
Answers
Suggested answer: C

Explanation:

SmartUpdate is the application that is used for the central management and deployment of licenses and packages.SmartUpdate allows administrators to manage licenses, software updates, and hotfixes for multiple Security Gateways and cluster members from one central location2. SmartProvisioning is an application that enables centralized management of network devices. SmartLicense is a feature that simplifies license management by using a cloud-based portal.Deployment Agent is a component that enables automatic deployment of software packages3.

Total 401 questions
Go to page: of 41