ExamGecko
Home Home / Checkpoint / 156-215.81

Checkpoint 156-215.81 Practice Test - Questions Answers, Page 35

Question list
Search
Search

Which of the following is TRUE regarding Gaia command line?

A.
Configuration changes should be done in mgmt_di and use CLISH for monitoring. Expert mode is used only for OS level tasks
A.
Configuration changes should be done in mgmt_di and use CLISH for monitoring. Expert mode is used only for OS level tasks
Answers
B.
Configuration changes should be done in mgmt_cli and use expert-mode for OS-level tasks.
B.
Configuration changes should be done in mgmt_cli and use expert-mode for OS-level tasks.
Answers
C.
Configuration changes should be done in expert-mode and CLISH is used for monitoring
C.
Configuration changes should be done in expert-mode and CLISH is used for monitoring
Answers
D.
All configuration changes should be made in CLISH and expert-mode should be used for OS-level tasks.
D.
All configuration changes should be made in CLISH and expert-mode should be used for OS-level tasks.
Answers
Suggested answer: D

Explanation:

The statement that is true regarding Gaia command line is that all configuration changes should be made in CLISH and expert-mode should be used for OS-level tasks. CLISH is the default shell of Gaia CLI that provides a limited set of commands for basic configuration and troubleshooting. Expert mode is an advanced shell that allows running Linux commands and accessing the file system. Configuration changes should not be done in expert-mode, as they may cause inconsistencies or errors in the system. The other statements are false regarding Gaia command line.

When a gateway requires user information for authentication, what order does it query servers for user information?

A.
First - Internal user database, then LDAP servers in order of priority, finally the generic external user profile
A.
First - Internal user database, then LDAP servers in order of priority, finally the generic external user profile
Answers
B.
First the Internal user database, then generic external user profile, finally LDAP servers in order of priority.
B.
First the Internal user database, then generic external user profile, finally LDAP servers in order of priority.
Answers
C.
First the highest priority LDAP server, then the internal user database, then lower priority LDAP servers, finally the generic external profile
C.
First the highest priority LDAP server, then the internal user database, then lower priority LDAP servers, finally the generic external profile
Answers
D.
The external generic profile, then the internal user database finally the LDAP servers in order of priority.
D.
The external generic profile, then the internal user database finally the LDAP servers in order of priority.
Answers
Suggested answer: B

Explanation:

When a gateway requires user information for authentication, it queries servers for user information in the following order: first the internal user database, then the generic external user profile, and finally LDAP servers in order of priority. The internal user database is a local database that stores user information on the Security Gateway or Security Management Server. The generic external user profile is a predefined profile that allows users to authenticate with any external server that supports RADIUS or TACACS protocols. LDAP servers are external servers that use the Lightweight Directory Access Protocol to store and retrieve user information. The gateway queries LDAP servers according to the priority that is defined in the LDAP Account Unit object properties.

Fill in the blank RADIUS Accounting gets_____data from requests generated by the accounting client

A.
Location
A.
Location
Answers
B.
Payload
B.
Payload
Answers
C.
Destination
C.
Destination
Answers
D.
Identity
D.
Identity
Answers
Suggested answer: D

Explanation:

RADIUS Accounting getsidentitydata from requests generated by the accounting client. RADIUS Accounting is a feature that allows tracking and measuring resource usage of network services by users. The accounting client, which is usually a network access server (NAS), sends accounting requests to a RADIUS server with information about user sessions, such as start and stop times, bytes transmitted and received, IP addresses, etc. The RADIUS server records this information in a database for billing, auditing, or reporting purposes. One of the mandatory attributes that the accounting client must include in every accounting request is the User-Name attribute, which identifies the user who is accessing the network service.

SmartConsole provides a consolidated solution for everything that is necessary for the security of an organization, such as the following

A.
Security Policy Management and Log Analysis
A.
Security Policy Management and Log Analysis
Answers
B.
Security Policy Management. Log Analysis. System Health Monitoring. Multi-Domain Security Management.
B.
Security Policy Management. Log Analysis. System Health Monitoring. Multi-Domain Security Management.
Answers
C.
Security Policy Management Log Analysis and System Health Monitoring
C.
Security Policy Management Log Analysis and System Health Monitoring
Answers
D.
Security Policy Management. Threat Prevention rules. System Health Monitoring and Multi-Domain Security Management.
D.
Security Policy Management. Threat Prevention rules. System Health Monitoring and Multi-Domain Security Management.
Answers
Suggested answer: A

Explanation:

SmartConsole provides a consolidated solution for everything that is necessary for the security of an organization, such as Security Policy Management and Log Analysis. Security Policy Management is the process of defining and enforcing rules that control the access and protection of network resources. Log Analysis is the process of collecting, analyzing, and reporting on log data that is generated by network devices and applications. SmartConsole is a unified graphical user interface that allows administrators to manage multiple security functions from a single console. The other options are not part of SmartConsole, but rather separate software blades or features that can be integrated with SmartConsole.

By default, which port does the WebUI listen on?

A.
8080
A.
8080
Answers
B.
80
B.
80
Answers
C.
4434
C.
4434
Answers
D.
443
D.
443
Answers
Suggested answer: B

Explanation:

By default, the WebUI listens on port 80. The WebUI is a web-based interface that allows administrators to configure and monitor Gaia OS settings and features from a web browser. The WebUI uses the HTTP protocol to communicate with the Gaia machine, which by default uses port 80 as the standard port number. The other port numbers are not used by the WebUI by default, but they can be changed by modifying the Gaia configuration file or using CLISH commands.

Fill in the blank Backup and restores can be accomplished through

A.
SmartUpdate, SmartBackup. or SmartConsole
A.
SmartUpdate, SmartBackup. or SmartConsole
Answers
B.
WebUI. CLI. or SmartUpdate
B.
WebUI. CLI. or SmartUpdate
Answers
C.
CLI. SmartUpdate, or SmartBackup
C.
CLI. SmartUpdate, or SmartBackup
Answers
D.
SmartConsole, WebUI. or CLI
D.
SmartConsole, WebUI. or CLI
Answers
Suggested answer: D

Explanation:

Backup and restores can be accomplished through SmartConsole, WebUI, or CLI.SmartUpdate and SmartBackup are not valid options1.

Which of the following is NOT a type of Endpoint Identity Agent?

A.
Custom
A.
Custom
Answers
B.
Terminal
B.
Terminal
Answers
C.
Full
C.
Full
Answers
D.
Light
D.
Light
Answers
Suggested answer: A

Explanation:

There are three types of Endpoint Identity Agents: Full, Light, and Terminal.Custom is not a valid type2.

An administrator wishes to use Application objects in a rule in their policy but there are no Application objects listed as options to add when clicking the'+' to add new items to the 'Services & Applications' column of a rule. What should be done to fix this?

A.
The administrator should drag-and-drop the needed Application objects from the Object Explorer into the new rule
A.
The administrator should drag-and-drop the needed Application objects from the Object Explorer into the new rule
Answers
B.
The 'Application Control' blade should be enabled on a gateway
B.
The 'Application Control' blade should be enabled on a gateway
Answers
C.
'Applications & URL Filtering' should first be enabled on the policy layer where the rule is being created.
C.
'Applications & URL Filtering' should first be enabled on the policy layer where the rule is being created.
Answers
D.
The administrator should first create some applications to add to the rule.
D.
The administrator should first create some applications to add to the rule.
Answers
Suggested answer: C

Explanation:

To use Application objects in a rule, the ''Applications & URL Filtering'' blade should be enabled on the policy layer where the rule is being created.Enabling the ''Application Control'' blade on a gateway is not enough3.

Which Threat Prevention Software Blade provides comprehensive protection against malicious and unwanted network traffic, focusing on application and server vulnerabilities?

A.
IPS
A.
IPS
Answers
B.
Anti-Virus
B.
Anti-Virus
Answers
C.
Anti-Spam
C.
Anti-Spam
Answers
D.
Anti-bot
D.
Anti-bot
Answers
Suggested answer: A

Explanation:

The IPS (Intrusion Prevention System) Software Blade provides comprehensive protection against malicious and unwanted network traffic, focusing on application and server vulnerabilities. The other options are not related to this function.

Using AD Query, the security gateway connections to the Active Directory Domain Controllers using what protocol?

A.
Windows Management Instrumentation (WMI)
A.
Windows Management Instrumentation (WMI)
Answers
B.
Hypertext Transfer Protocol Secure (HTTPS)
B.
Hypertext Transfer Protocol Secure (HTTPS)
Answers
C.
Lightweight Directory Access Protocol (LDAP)
C.
Lightweight Directory Access Protocol (LDAP)
Answers
D.
Remote Desktop Protocol (RDP)
D.
Remote Desktop Protocol (RDP)
Answers
Suggested answer: C

Explanation:

Using AD Query, the security gateway connections to the Active Directory Domain Controllers using LDAP (Lightweight Directory Access Protocol). The other protocols are not used for this purpose.

Total 401 questions
Go to page: of 41