ExamGecko
Home Home / Checkpoint / 156-215.81

Checkpoint 156-215.81 Practice Test - Questions Answers, Page 3

Question list
Search
Search

Identify the ports to which the Client Authentication daemon listens on by default?

A.
259, 900
A.
259, 900
Answers
B.
256, 257
B.
256, 257
Answers
C.
8080, 529
C.
8080, 529
Answers
D.
80, 256
D.
80, 256
Answers
Suggested answer: A

Explanation:

The ports to which the Client Authentication daemon listens on by default are 259 and 900. Client Authentication is a method that allows users to authenticate with the Security Gateway before they are allowed access to protected resources. The Client Authentication daemon (fwauthd) runs on the Security Gateway and listens for authentication requests on TCP ports 259 and 900 .

Reference: [Check Point R81 Remote Access VPN Administration Guide], [Check Point R81 Quantum Security Gateway Guide]

What is the purpose of the CPCA process?

A.
Monitoring the status of processes
A.
Monitoring the status of processes
Answers
B.
Sending and receiving logs
B.
Sending and receiving logs
Answers
C.
Communication between GUI clients and the SmartCenter server
C.
Communication between GUI clients and the SmartCenter server
Answers
D.
Generating and modifying certificates
D.
Generating and modifying certificates
Answers
Suggested answer: D

Explanation:

The purpose of the CPCA process is generating and modifying certificates. CPCA stands for Check Point Certificate Authority and it is a process that runs on the Security Management Server or Log Server. It is responsible for creating and managing certificates for internal communication between Check Point components, such as SIC .

Reference: [Check Point R81 Quantum Security Management Administration Guide], [Check Point R81 Quantum Security Gateway Guide]

The Network Operations Center administrator needs access to Check Point Security devices mostly for troubleshooting purposes. You do not want to give her access to the expert mode, but she still should be able to run tcpdump. How can you achieve this requirement?

A.
Add tcpdump to CLISH using add command.Create a new access role.Add tcpdump to the role.Create new user with any UID and assign role to the user.
A.
Add tcpdump to CLISH using add command.Create a new access role.Add tcpdump to the role.Create new user with any UID and assign role to the user.
Answers
B.
Add tcpdump to CLISH using add command.Create a new access role.Add tcpdump to the role.Create new user with UID 0 and assign role to the user.
B.
Add tcpdump to CLISH using add command.Create a new access role.Add tcpdump to the role.Create new user with UID 0 and assign role to the user.
Answers
C.
Create a new access role.Add expert-mode access to the role.Create new user with UID 0 and assign role to the user.
C.
Create a new access role.Add expert-mode access to the role.Create new user with UID 0 and assign role to the user.
Answers
D.
Create a new access role.Add expert-mode access to the role.Create new user with any UID and assign role to the user.
D.
Create a new access role.Add expert-mode access to the role.Create new user with any UID and assign role to the user.
Answers
Suggested answer: A

Explanation:

To achieve the requirement of giving the Network Operations Center administrator access to Check Point Security devices mostly for troubleshooting purposes, but not to the expert mode, and still allowing her to run tcpdump, you need to:

Add tcpdump to CLISH using add command. This command adds a new command to the Command Line Interface Shell (CLISH) that allows running tcpdump without entering the expert mode .

Create a new access role. This option defines a set of permissions and commands that can be assigned to a user or a group of users.

Add tcpdump to the role. This option grants the permission to run tcpdump to the role.

Create new user with any UID and assign role to the user. This option creates a new user account with any User ID (UID) and assigns the role that has tcpdump permission to the user.

When logging in for the first time to a Security management Server through SmartConsole, a fingerprint is saved to the:

A.
Security Management Server's /home/.fgpt file and is available for future SmartConsole authentications.
A.
Security Management Server's /home/.fgpt file and is available for future SmartConsole authentications.
Answers
B.
Windows registry is available for future Security Management Server authentications.
B.
Windows registry is available for future Security Management Server authentications.
Answers
C.
There is no memory used for saving a fingerprint anyway.
C.
There is no memory used for saving a fingerprint anyway.
Answers
D.
SmartConsole cache is available for future Security Management Server authentications.
D.
SmartConsole cache is available for future Security Management Server authentications.
Answers
Suggested answer: D

Explanation:

When logging in for the first time to a Security Management Server through SmartConsole, a fingerprint is saved to the SmartConsole cache and is available for future Security Management Server authentications. The fingerprint is a unique identifier of the Security Management Server that is used to verify its identity and prevent man-in-the-middle attacks. The SmartConsole cache is a local folder on the client machine that stores temporary files and settings.

Fill in the blank: By default, the SIC certificates issued by R80 Management Server are based on the ____________ algorithm.

A.
SHA-256
A.
SHA-256
Answers
B.
SHA-200
B.
SHA-200
Answers
C.
MD5
C.
MD5
Answers
D.
SHA-128
D.
SHA-128
Answers
Suggested answer: A

Explanation:

By default, the SIC certificates issued by R80 Management Server are based on the SHA-256 algorithm1. SHA-256 is a secure hash algorithm that produces a 256-bit digest. SHA-200, MD5, and SHA-128 are not valid algorithms for SIC certificates.

Reference:SHA-1 and SHA-256 certificates in Check Point Internal CA (ICA)

Which message indicates IKE Phase 2 has completed successfully?

A.
Quick Mode Complete
A.
Quick Mode Complete
Answers
B.
Aggressive Mode Complete
B.
Aggressive Mode Complete
Answers
C.
Main Mode Complete
C.
Main Mode Complete
Answers
D.
IKE Mode Complete
D.
IKE Mode Complete
Answers
Suggested answer: A

Explanation:

Quick Mode Complete is the message that indicates IKE Phase 2 has completed successfully2. IKE Phase 2 is also known as Quick Mode or Child SA in IKEv1 and IKEv2 respectively. Aggressive Mode and Main Mode are part of IKE Phase 1, which establishes the IKE SA. IKE Mode is not a valid term for IKE negotiation.

Reference:How to Analyze IKE Phase 2 VPN Status Messages,IKEv2 Phase 1 (IKE SA) and Phase 2 (Child SA) Message Exchanges,Understand IPsec IKEv1 Protocol

Administrator Dave logs into R80 Management Server to review and makes some rule changes. He notices that there is a padlock sign next to the DNS rule in the Rule Base.

What is the possible explanation for this?

A.
DNS Rule is using one of the new feature of R80 where an administrator can mark a rule with the padlock icon to let other administrators know it is important.
A.
DNS Rule is using one of the new feature of R80 where an administrator can mark a rule with the padlock icon to let other administrators know it is important.
Answers
B.
Another administrator is logged into the Management and currently editing the DNS Rule.
B.
Another administrator is logged into the Management and currently editing the DNS Rule.
Answers
C.
DNS Rule is a placeholder rule for a rule that existed in the past but was deleted.
C.
DNS Rule is a placeholder rule for a rule that existed in the past but was deleted.
Answers
D.
This is normal behavior in R80 when there are duplicate rules in the Rule Base.
D.
This is normal behavior in R80 when there are duplicate rules in the Rule Base.
Answers
Suggested answer: B

Explanation:

The padlock sign next to the DNS rule in the Rule Base indicates that another administrator is logged into the Management and currently editing the DNS Rule1. This is a feature of R80 that allows multiple administrators to work on the same policy simultaneously.The padlock sign prevents other administrators from modifying the same rule until the editing administrator publishes or discards the changes2. The other options are not valid explanations for the padlock sign.

Reference:156-215.80 : Check Point Certified Security Administrator (CCSA R80) : Part 19,Multi-User Policy Editing

Fill in the blank: When tunnel test packets no longer invoke a response, SmartView Monitor displays _____________ for the given VPN tunnel.

A.
Down
A.
Down
Answers
B.
No Response
B.
No Response
Answers
C.
Inactive
C.
Inactive
Answers
D.
Failed
D.
Failed
Answers
Suggested answer: A

Explanation:

When tunnel test packets no longer invoke a response, SmartView Monitor displaysDownfor the given VPN tunnel1. This means that the VPN tunnel is not operational and there is no IKE or IPsec traffic passing through it. No Response, Inactive, and Failed are not valid statuses for VPN tunnels in SmartView Monitor.

Reference:Smart View Monitor displays status for all S2S VPN tunnels - Phase1 UP

Which is a suitable command to check whether Drop Templates are activated or not?

A.
fw ctl get int activate_drop_templates
A.
fw ctl get int activate_drop_templates
Answers
B.
fwaccel stat
B.
fwaccel stat
Answers
C.
fwaccel stats
C.
fwaccel stats
Answers
D.
fw ctl templates --d
D.
fw ctl templates --d
Answers
Suggested answer: B

Explanation:

The commandfwaccel statshows the status of SecureXL, including whether Drop Templates are enabled or not1.

Reference:Check Point SecureXL R81 Administration Guide

Please choose correct command syntax to add an ''emailserver1'' host with IP address 10.50.23.90 using GAiA management CLI?

A.
hostname myHost12 ip-address 10.50.23.90
A.
hostname myHost12 ip-address 10.50.23.90
Answers
B.
mgmt add host name ip-address 10.50.23.90
B.
mgmt add host name ip-address 10.50.23.90
Answers
C.
add host name emailserver1 ip-address 10.50.23.90
C.
add host name emailserver1 ip-address 10.50.23.90
Answers
D.
mgmt add host name emailserver1 ip-address 10.50.23.90
D.
mgmt add host name emailserver1 ip-address 10.50.23.90
Answers
Suggested answer: D

Explanation:

The correct syntax for adding a host using GAiA management CLI ismgmt add host name <name> ip-address <ip-address>2.

Reference:Check Point GAiA R81 Command Line Interface Reference Guide

Total 401 questions
Go to page: of 41