ExamGecko
Home Home / Checkpoint / 156-215.81

Checkpoint 156-215.81 Practice Test - Questions Answers, Page 26

Question list
Search
Search

Which Check Point software blade prevents malicious files from entering a network using virus signatures and anomaly-based protections from ThreatCloud?

A.
Firewall
A.
Firewall
Answers
B.
Application Control
B.
Application Control
Answers
C.
Anti-spam and Email Security
C.
Anti-spam and Email Security
Answers
D.
Anti-Virus
D.
Anti-Virus
Answers
Suggested answer: D

Explanation:

Anti-Virus is the Check Point software blade that prevents malicious files from entering a network using virus signatures and anomaly-based protections from ThreatCloud. Anti-Virus scans files and email attachments for viruses, worms, trojans, and other types of malware. It also uses ThreatCloud, a collaborative network that delivers real-time dynamic security intelligence, to detect unknown malware based on their behavior. Firewall is a software blade that enforces security policy by inspecting and controlling network traffic. Application Control is a software blade that enables administrators to control access to web applications. Anti-spam and Email Security is a software blade that protects email infrastructure from spam, phishing, and malware attacks.

Why is a Central License the preferred and recommended method of licensing?

A.
Central Licensing is actually not supported with Gaia.
A.
Central Licensing is actually not supported with Gaia.
Answers
B.
Central Licensing is the only option when deploying Gaia
B.
Central Licensing is the only option when deploying Gaia
Answers
C.
Central Licensing ties to the IP address of a gateway and can be changed to any gateway if needed.
C.
Central Licensing ties to the IP address of a gateway and can be changed to any gateway if needed.
Answers
D.
Central Licensing ties to the IP address of the management server and is not dependent on the IP of any gateway in the event it changes.
D.
Central Licensing ties to the IP address of the management server and is not dependent on the IP of any gateway in the event it changes.
Answers
Suggested answer: D

Explanation:

Central License is the preferred and recommended method of licensing because it ties to the IP address of the management server and is not dependent on the IP of any gateway in the event it changes. Central License allows administrators to manage licenses for all Security Gateways from one central location. If the IP address of a gateway changes, the license remains valid as long as it is connected to the same management server. Central Licensing is supported with Gaia and is not the only option when deploying Gaia. Central Licensing does not tie to the IP address of a gateway and can not be changed to any gateway if needed.

What default layers are included when creating a new policy layer?

A.
Application Control, URL Filtering and Threat Prevention
A.
Application Control, URL Filtering and Threat Prevention
Answers
B.
Access Control, Threat Prevention and HTTPS Inspection
B.
Access Control, Threat Prevention and HTTPS Inspection
Answers
C.
Firewall, Application Control and IPSec VPN
C.
Firewall, Application Control and IPSec VPN
Answers
D.
Firewall, Application Control and IPS
D.
Firewall, Application Control and IPS
Answers
Suggested answer: B

Explanation:

The default layers that are included when creating a new policy layer are Access Control, Threat Prevention, and HTTPS Inspection. Access Control is the layer that defines the basic firewall rules. Threat Prevention is the layer that enables the protection against various types of attacks, such as IPS, Anti-Virus, Anti-Bot, etc.HTTPS Inspection is the layer that allows the inspection of encrypted traffic1. The other options are not the default layers that are included when creating a new policy layer.

After a new Log Server is added to the environment and the SIC trust has been established with the SMS what will the gateways do?

A.
The gateways can only send logs to an SMS and cannot send logs to a Log Server. Log Servers are proprietary log archive servers.
A.
The gateways can only send logs to an SMS and cannot send logs to a Log Server. Log Servers are proprietary log archive servers.
Answers
B.
Gateways will send new firewall logs to the new Log Server as soon as the SIC trust is set up between the SMS and the new Log Server.
B.
Gateways will send new firewall logs to the new Log Server as soon as the SIC trust is set up between the SMS and the new Log Server.
Answers
C.
The firewalls will detect the new Log Server after the next policy install and redirect the new logs to the new Log Server.
C.
The firewalls will detect the new Log Server after the next policy install and redirect the new logs to the new Log Server.
Answers
D.
Logs are not automatically forwarded to a new Log Server. SmartConsole must be used to manually configure each gateway to send its logs to the server.
D.
Logs are not automatically forwarded to a new Log Server. SmartConsole must be used to manually configure each gateway to send its logs to the server.
Answers
Suggested answer: D

Explanation:

Logs are not automatically forwarded to a new Log Server. SmartConsole must be used to manually configure each gateway to send its logs to the server.After adding a new Log Server and establishing the SIC trust with the SMS, the administrator must use SmartConsole to assign the Log Server to each gateway in the Logs and Masters section of the gateway properties2. The other options are not correct, as gateways can send logs to both SMS and Log Server, Log Servers are not proprietary log archive servers, and gateways will not detect the new Log Server after the next policy install.

Name the utility that is used to block activities that appear to be suspicious.

A.
Penalty Box
A.
Penalty Box
Answers
B.
Drop Rule in the rulebase
B.
Drop Rule in the rulebase
Answers
C.
Suspicious Activity Monitoring (SAM)
C.
Suspicious Activity Monitoring (SAM)
Answers
D.
Stealth rule
D.
Stealth rule
Answers
Suggested answer: C

Explanation:

Suspicious Activity Monitoring (SAM) is the utility that is used to block activities that appear to be suspicious.SAM allows administrators to block connections from specific IP addresses or network objects for a specified period of time3. Penalty Box is a feature of SAM that automatically blocks connections from sources that generate too many log entries. Drop Rule in the rulebase is a firewall action that discards packets that match certain criteria. Stealth rule is a firewall rule that prevents direct access to the Security Gateway from external sources.

When URL Filtering is set, what identifying data gets sent to the Check Point Online Web Service?

A.
The URL and server certificate are sent to the Check Point Online Web Service
A.
The URL and server certificate are sent to the Check Point Online Web Service
Answers
B.
The full URL, including page data, is sent to the Check Point Online Web Service
B.
The full URL, including page data, is sent to the Check Point Online Web Service
Answers
C.
The host part of the URL is sent to the Check Point Online Web Service
C.
The host part of the URL is sent to the Check Point Online Web Service
Answers
D.
The URL and IP address are sent to the Check Point Online Web Service
D.
The URL and IP address are sent to the Check Point Online Web Service
Answers
Suggested answer: C

Explanation:

When URL Filtering is set, only the host part of the URL is sent to the Check Point Online Web Service for analysis. The host part is the part of the URL that identifies the web server, such as www.example.com. The Check Point Online Web Service uses this information to categorize the URL and return the appropriate action to the Security Gateway. The other options are not sent to the Check Point Online Web Service for analysis, as they may contain sensitive or irrelevant data.

Name the pre-defined Roles included in Gaia OS.

A.
AdminRole, and MonitorRole
A.
AdminRole, and MonitorRole
Answers
B.
ReadWriteRole, and ReadyOnly Role
B.
ReadWriteRole, and ReadyOnly Role
Answers
C.
AdminRole, cloningAdminRole, and Monitor Role
C.
AdminRole, cloningAdminRole, and Monitor Role
Answers
D.
AdminRole
D.
AdminRole
Answers
Suggested answer: A

Explanation:

The pre-defined Roles included in Gaia OS are AdminRole and MonitorRole. AdminRole is the role that has full access to all Gaia features and commands.MonitorRole is the role that has read-only access to Gaia features and commands1. The other options are not valid pre-defined Roles in Gaia OS.

Gaia has two default user accounts that cannot be deleted. What are those user accounts?

A.
Admin and Default
A.
Admin and Default
Answers
B.
Expert and Clish
B.
Expert and Clish
Answers
C.
Control and Monitor
C.
Control and Monitor
Answers
D.
Admin and Monitor
D.
Admin and Monitor
Answers
Suggested answer: D

Explanation:

Gaia has two default user accounts that cannot be deleted. They are Admin and Monitor. Admin is the user account that has full administrative privileges and can access both WebUI and CLI.Monitor is the user account that has read-only privileges and can access only WebUI2. The other options are not default user accounts in Gaia.

Which single Security Blade can be turned on to block both malicious files from being downloaded as well as block websites known to host malware?

A.
Anti-Bot
A.
Anti-Bot
Answers
B.
None - both Anti-Virus and Anti-Bot are required for this
B.
None - both Anti-Virus and Anti-Bot are required for this
Answers
C.
Anti-Virus
C.
Anti-Virus
Answers
D.
None - both URL Filtering and Anti-Virus are required for this.
D.
None - both URL Filtering and Anti-Virus are required for this.
Answers
Suggested answer: C

Explanation:

Anti-Virus is the single Security Blade that can be turned on to block both malicious files from being downloaded as well as block websites known to host malware. Anti-Virus scans files and email attachments for viruses, worms, trojans, and other types of malware.It also uses ThreatCloud, a collaborative network that delivers real-time dynamic security intelligence, to detect unknown malware based on their behavior3. Anti-Bot is a Security Blade that detects and blocks botnet communications, but it does not scan files or block websites. URL Filtering is a Security Blade that enables administrators to control access to web applications, but it does not scan files or detect malware.

Log query results can be exported to what file format?

A.
Word Document (docx)
A.
Word Document (docx)
Answers
B.
Comma Separated Value (csv)
B.
Comma Separated Value (csv)
Answers
C.
Portable Document Format (pdf)
C.
Portable Document Format (pdf)
Answers
D.
Text (txt)
D.
Text (txt)
Answers
Suggested answer: B

Explanation:

Log query results can be exported to Comma Separated Value (csv) file format. CSV is a file format that stores tabular data in plain text. It is compatible with various applications, such as Excel, Google Sheets, etc. The other options are not valid file formats for exporting log query results.

Total 401 questions
Go to page: of 41