ExamGecko
Home Home / Checkpoint / 156-215.81

Checkpoint 156-215.81 Practice Test - Questions Answers, Page 27

Question list
Search
Search

There are four policy types available for each policy package. What are those policy types?

A.
Access Control, Threat Prevention, Mobile Access and HTTPS Inspection
A.
Access Control, Threat Prevention, Mobile Access and HTTPS Inspection
Answers
B.
Access Control, Custom Threat Prevention, Autonomous Threat Prevention and HTTPS Inspection
B.
Access Control, Custom Threat Prevention, Autonomous Threat Prevention and HTTPS Inspection
Answers
C.
There are only three policy types: Access Control, Threat Prevention and NAT.
C.
There are only three policy types: Access Control, Threat Prevention and NAT.
Answers
D.
Access Control, Threat Prevention, NAT and HTTPS Inspection
D.
Access Control, Threat Prevention, NAT and HTTPS Inspection
Answers
Suggested answer: D

Explanation:

The four policy types available for each policy package are Access Control, Threat Prevention, NAT, and HTTPS Inspection. Access Control is the policy type that defines the basic firewall rules. Threat Prevention is the policy type that enables the protection against various types of attacks, such as IPS, Anti-Virus, Anti-Bot, etc. NAT is the policy type that defines the network address translation rules.HTTPS Inspection is the policy type that allows the inspection of encrypted traffic1. The other options are not valid policy types for each policy package.

Which tool allows for the automatic updating of the Gaia OS and Check Point products installed on the Gaia OS?

A.
CPASE - Check Point Automatic Service Engine
A.
CPASE - Check Point Automatic Service Engine
Answers
B.
CPAUE - Check Point Automatic Update Engine
B.
CPAUE - Check Point Automatic Update Engine
Answers
C.
CPDAS - Check Point Deployment Agent Service
C.
CPDAS - Check Point Deployment Agent Service
Answers
D.
CPUSE - Check Point Upgrade Service Engine
D.
CPUSE - Check Point Upgrade Service Engine
Answers
Suggested answer: D

Explanation:

CPUSE - Check Point Upgrade Service Engine is the tool that allows for the automatic updating of the Gaia OS and Check Point products installed on the Gaia OS.CPUSE is a web-based tool that simplifies the installation of software updates, hotfixes, and upgrade packages on Gaia OS2. The other options are not valid tools for updating Gaia OS and Check Point products.

The purpose of the Communication Initialization process is to establish a trust between the Security Management Server and the Check Point gateways. Which statement best describes this Secure Internal Communication (SIC)?

A.
After successful initialization, the gateway can communicate with any Check Point node that possesses a SIC certificate signed by the same ICA.
A.
After successful initialization, the gateway can communicate with any Check Point node that possesses a SIC certificate signed by the same ICA.
Answers
B.
Secure Internal Communications authenticates the security gateway to the SMS before http communications are allowed.
B.
Secure Internal Communications authenticates the security gateway to the SMS before http communications are allowed.
Answers
C.
A SIC certificate is automatically generated on the gateway because the gateway hosts a subordinate CA to the SMS ICA.
C.
A SIC certificate is automatically generated on the gateway because the gateway hosts a subordinate CA to the SMS ICA.
Answers
D.
New firewalls can easily establish the trust by using the expert password defined on the SMS and the SMS IP address.
D.
New firewalls can easily establish the trust by using the expert password defined on the SMS and the SMS IP address.
Answers
Suggested answer: A

Explanation:

The statement that best describes Secure Internal Communication (SIC) is: After successful initialization, the gateway can communicate with any Check Point node that possesses a SIC certificate signed by the same ICA.SIC is a mechanism that ensures secure communication between Check Point components by using certificates that are issued by an Internal Certificate Authority (ICA)3. The other statements are not accurate descriptions of SIC.

What are the types of Software Containers?

A.
Smart Console, Security Management, and Security Gateway
A.
Smart Console, Security Management, and Security Gateway
Answers
B.
Security Management, Security Gateway, and Endpoint Security
B.
Security Management, Security Gateway, and Endpoint Security
Answers
C.
Security Management, Log & Monitoring, and Security Policy
C.
Security Management, Log & Monitoring, and Security Policy
Answers
D.
Security Management, Standalone, and Security Gateway
D.
Security Management, Standalone, and Security Gateway
Answers
Suggested answer: B

Explanation:

The types of Software Containers are Security Management, Security Gateway, and Endpoint Security. Software Containers are virtual environments that run on top of Gaia OS and allow multiple instances of Check Point products to coexist on the same physical machine. The other options are not valid types of Software Containers.

Stateful Inspection compiles and registers connections where?

A.
Connection Cache
A.
Connection Cache
Answers
B.
State Cache
B.
State Cache
Answers
C.
State Table
C.
State Table
Answers
D.
Network Table
D.
Network Table
Answers
Suggested answer: C

Explanation:

Stateful Inspection compiles and registers connections in the State Table. The State Table is a database that stores information about active connections and sessions on the Security Gateway. The other options are not valid names for the database that stores connection information.

Security Zones do no work with what type of defined rule?

A.
Application Control rule
A.
Application Control rule
Answers
B.
Manual NAT rule
B.
Manual NAT rule
Answers
C.
IPS bypass rule
C.
IPS bypass rule
Answers
D.
Firewall rule
D.
Firewall rule
Answers
Suggested answer: B

Explanation:

Security Zones are a feature of Application Control and Identity Awareness that allow you to define groups of network objects based on their level of trust.Security Zones do not work with Manual NAT rules, because Manual NAT rules are applied before the Application Control and Identity Awareness policy is enforced1.

Reference:Check Point R81 Security Management Administration Guide

Most Check Point deployments use Gaia but which product deployment utilizes special Check Point code (with unification in R81.10)?

A.
Enterprise Network Security Appliances
A.
Enterprise Network Security Appliances
Answers
B.
Rugged Appliances
B.
Rugged Appliances
Answers
C.
Scalable Platforms
C.
Scalable Platforms
Answers
D.
Small Business and Branch Office Appliances
D.
Small Business and Branch Office Appliances
Answers
Suggested answer: C

Explanation:

Most Check Point deployments use Gaia, which is a unified operating system for all Check Point appliances, open servers, and virtualized gateways. However, some product deployments utilize special Check Point code, such as Scalable Platforms (formerly known as Maestro), which are high-performance security gateways that can scale up to 1.5 Tbps of firewall throughput.Scalable Platforms use a special version of Gaia OS called Gaia Embedded, which is planned to be unified with Gaia OS in R81.102.

Reference:Check Point R81 Release Notes

URL Filtering cannot be used to:

A.
Control Bandwidth issues
A.
Control Bandwidth issues
Answers
B.
Control Data Security
B.
Control Data Security
Answers
C.
Improve organizational security
C.
Improve organizational security
Answers
D.
Decrease legal liability
D.
Decrease legal liability
Answers
Suggested answer: A

Explanation:

URL Filtering is a blade that enables administrators to control access to millions of websites by category, users, groups, and machines. URL Filtering can be used to improve organizational security, decrease legal liability, and control data security by preventing users from accessing malicious or inappropriate websites.However, URL Filtering cannot be used to control bandwidth issues, such as limiting the amount of traffic or prioritizing certain applications over others3. For that purpose, other blades such as QoS (Quality of Service) or SecureXL are more suitable.

Reference:Check Point R81 URL Filtering Administration Guide

Which SmartConsole application shows correlated logs and aggregated data to provide an overview of potential threats and attack patterns?

A.
SmartEvent
A.
SmartEvent
Answers
B.
SmartView Tracker
B.
SmartView Tracker
Answers
C.
SmartLog
C.
SmartLog
Answers
D.
SmartView Monitor
D.
SmartView Monitor
Answers
Suggested answer: A

Explanation:

SmartEvent is a unified security management solution that provides real-time visibility into security events across the network. SmartEvent shows correlated logs and aggregated data to provide an overview of potential threats and attack patterns, as well as generate reports and alerts based on predefined or customized indicators. SmartView Tracker, SmartLog, and SmartView Monitor are other SmartConsole applications that can show logs, search queries, and network statistics respectively, but they do not provide the same level of correlation and analysis as SmartEvent.

Reference: [Check Point R81 SmartEvent Administration Guide]

Which of the following is used to extract state related information from packets and store that information in state tables?

A.
STATE Engine
A.
STATE Engine
Answers
B.
TRACK Engine
B.
TRACK Engine
Answers
C.
RECORD Engine
C.
RECORD Engine
Answers
D.
INSPECT Engine
D.
INSPECT Engine
Answers
Suggested answer: D

Explanation:

The INSPECT Engine is the core component of Check Point's Stateful Inspection technology. It is used to extract state related information from packets and store that information in state tables.The INSPECT Engine also evaluates the security policy and enforces it on the packets1.

Reference:Check Point R81 Security Gateway Technical Administration Guide

Total 401 questions
Go to page: of 41