ExamGecko
Home Home / Checkpoint / 156-215.81

Checkpoint 156-215.81 Practice Test - Questions Answers, Page 39

Question list
Search
Search

Bob and Joe both have Administrator Roles on their Gaia Platform. Bob logs in on the WebUI and then Joe logs in through CLI. Choose what BEST describes the following scenario, where Bob and Joe are both logged in:

A.
Since they both are logged in on different interfaces, they will both be able to make changes.
A.
Since they both are logged in on different interfaces, they will both be able to make changes.
Answers
B.
When Joe logs in. Bob will be logged out automatically.
B.
When Joe logs in. Bob will be logged out automatically.
Answers
C.
The database will be locked by Bob and Joe will not be able to make any changes.
C.
The database will be locked by Bob and Joe will not be able to make any changes.
Answers
D.
Bob will receive a prompt that Joe has logged in.
D.
Bob will receive a prompt that Joe has logged in.
Answers
Suggested answer: A

Fill in the blank: A(n)_____rule is created by an administrator and configured to allow or block traffic based on specified criteria.

A.
Inline
A.
Inline
Answers
B.
Explicit
B.
Explicit
Answers
C.
Implicit drop
C.
Implicit drop
Answers
D.
Implicit drop
D.
Implicit drop
Answers
Suggested answer: B

Check Point licenses come in two forms. What are those forms?

A.
Security Gateway and Security Management.
A.
Security Gateway and Security Management.
Answers
B.
On-premise and Public Cloud
B.
On-premise and Public Cloud
Answers
C.
Central and Local.
C.
Central and Local.
Answers
D.
Access Control and Threat Prevention.
D.
Access Control and Threat Prevention.
Answers
Suggested answer: C

Which of the following statements about Site-to-Site VPN Domain-based is NOT true?

A.
Route-based--- The Security Gateways will have a Virtual Tunnel Interface (VTI) for each VPN Tunnel with a peer VPN Gateway. The Routing Table can have routes to forward traffic to these VTls. Any traffic routed through a VTI is automatically identified as VPN Traffic and is passed through the VPN Tunnel associated with the VTI.
A.
Route-based--- The Security Gateways will have a Virtual Tunnel Interface (VTI) for each VPN Tunnel with a peer VPN Gateway. The Routing Table can have routes to forward traffic to these VTls. Any traffic routed through a VTI is automatically identified as VPN Traffic and is passed through the VPN Tunnel associated with the VTI.
Answers
B.
Domain-based--- VPN domains are pre-defined for all VPN Gateways. A VPN domain is a service or user that can send or receive VPN traffic through a VPN Gateway.
B.
Domain-based--- VPN domains are pre-defined for all VPN Gateways. A VPN domain is a service or user that can send or receive VPN traffic through a VPN Gateway.
Answers
C.
Domain-based--- VPN domains are pre-defined for all VPN Gateways. A VPN domain is a host or network that can send or receive VPN traffic through a VPN Gateway.
C.
Domain-based--- VPN domains are pre-defined for all VPN Gateways. A VPN domain is a host or network that can send or receive VPN traffic through a VPN Gateway.
Answers
D.
Domain-based--- VPN domains are pre-defined for all VPN Gateways. When the Security Gateway encounters traffic originating from one VPN Domain with the destination to a VPN Domain of another VPN Gateway, that traffic is identified as VPN traffic and is sent through the VPN Tunnel between the two Gateways.
D.
Domain-based--- VPN domains are pre-defined for all VPN Gateways. When the Security Gateway encounters traffic originating from one VPN Domain with the destination to a VPN Domain of another VPN Gateway, that traffic is identified as VPN traffic and is sent through the VPN Tunnel between the two Gateways.
Answers
Suggested answer: B

Explanation:

Domain-based--- VPN domains are pre-defined for all VPN Gateways. A VPN domain is a service or user that can send or receive VPN traffic through a VPN Gateway.

This statement isnot truebecause a VPN domain isnota service or user, but ahost or networkthat can send or receive VPN traffic through a VPN Gateway1.This is the definition given in the Site to Site VPN R81 Administration Guide1.The other statements are true according to the same guide1.

Remote Access VPN R81.20 Administration Guide

Site to Site VPN R81 Administration Guide

DeepDive Webinar - R81.20 Seamless VPN Connection to Public Cloud

You had setup the VPN Community NPN-Stores' with 3 gateways. There are some issues with one remote gateway(l .1.1.1) and an your local gateway. What will be the best log filter to see only the IKE Phase 2 agreed networks for both gateways.

A.
action:''Key Install' AND 1.1.1.1 AND Quick Mode
A.
action:''Key Install' AND 1.1.1.1 AND Quick Mode
Answers
B.
Blade:''VPN''AND VPN-Stores AND Main Mode
B.
Blade:''VPN''AND VPN-Stores AND Main Mode
Answers
C.
action:''Key Install'' AND 1.1.1.1 AND Main Mode
C.
action:''Key Install'' AND 1.1.1.1 AND Main Mode
Answers
D.
Blade:''VPN''AND VPN-Stores AND Quick Mode
D.
Blade:''VPN''AND VPN-Stores AND Quick Mode
Answers
Suggested answer: A

Explanation:

This log filter will show only the logs that have the action of ''Key Install'', which means that the Security Gateway installed a new encryption key for the VPN tunnel1. It will also show only the logs that have the IP address of 1.1.1.1, which is the remote gateway that has some issues.Finally, it will show only the logs that have the Quick Mode, which is the IKE Phase 2 negotiation that establishes the agreed networks for both gateways2.

The other log filters are not correct because they either include the Main Mode, which is the IKE Phase 1 negotiation that establishes the secure channel between the gateways2, or they do not specify the IP address of the remote gateway.

Logging and Monitoring R81.20 Administration Guide

Remote Access VPN R81.20 Administration Guide

Remote Access VPN R81 Administration Guide

Aggressive Mode in IKEv1 uses how many packages for negotiation?

A.
6
A.
6
Answers
B.
3
B.
3
Answers
C.
depends on the make of the peer gateway
C.
depends on the make of the peer gateway
Answers
D.
5
D.
5
Answers
Suggested answer: B

Explanation:

Aggressive Mode in IKEv1 usesthree packetsfor negotiation, with all data required for the SA passed by the initiator1. The responder sends the proposal, key material, and ID, and authenticates the session in the next packet.The initiator replies and authenticates the session1.

The other answers are not correct because they either refer to the Main Mode in IKEv1, which uses six packets for negotiation2, or they are irrelevant to the number of packets used in Aggressive Mode.

Understand IPsec IKEv1 Protocol - Cisco

Negotiation modes for phase 1 - IBM

FAQ-What are the differences between IKEv1 and IKEv2- Huawei

AdminA and AdminB are both logged in on SmartConsole What does it mean if AdmmB sees a lock icon on a rule? Choose the BEST answer.

A.
Rule is locked by AdminA and will be made available if the session is published
A.
Rule is locked by AdminA and will be made available if the session is published
Answers
B.
Rule is locked by AdminA because the rule is currently being edited
B.
Rule is locked by AdminA because the rule is currently being edited
Answers
C.
Rule is locked by AdminA and if the session is saved, the rule will be made available
C.
Rule is locked by AdminA and if the session is saved, the rule will be made available
Answers
D.
Rule is locked by AdminA because the save button has not been pressed
D.
Rule is locked by AdminA because the save button has not been pressed
Answers
Suggested answer: A

Explanation:

If AdminB sees a lock icon on a rule, it means that the rule is locked by AdminA and will be made available if the session is published. A session is a set of changes made by an administrator in SmartConsole.A session can be published to save and share the changes with other administrators, or discarded to cancel the changes and unlock the objects1.

Fill in the blank When LDAP is integrated with Check Point Security Management it is then referred to as_____

A.
User Center
A.
User Center
Answers
B.
User Administration
B.
User Administration
Answers
C.
User Directory
C.
User Directory
Answers
D.
UserCheck
D.
UserCheck
Answers
Suggested answer: C

Explanation:

When LDAP is integrated with Check Point Security Management, it is then referred to as User Directory.User Directory is a feature that allows administrators to manage users and user groups from an external LDAP server, such as Active Directory2.

Which of the following is an identity acquisition method that allows a Security Gateway to identify Active Directory users and computers?

A.
Active Directory Query
A.
Active Directory Query
Answers
B.
User Directory Query
B.
User Directory Query
Answers
C.
Account Unit Query
C.
Account Unit Query
Answers
D.
UserCheck
D.
UserCheck
Answers
Suggested answer: A

Explanation:

Active Directory Query is an identity acquisition method that allows a Security Gateway to identify Active Directory users and computers. Active Directory Query enables the Security Gateway to query the Active Directory Domain Controllers for user and computer information, such as IP addresses, group memberships, and login events.

In the Check Point three-tiered architecture, which of the following is NOT a function of the Security Management Server?

A.
Display policies and logs on the administrator's workstation.
A.
Display policies and logs on the administrator's workstation.
Answers
B.
Processing and sending alerts such as SNMP traps and email notifications.
B.
Processing and sending alerts such as SNMP traps and email notifications.
Answers
C.
Verify and compile Security Policies.
C.
Verify and compile Security Policies.
Answers
D.
Store firewall logs to hard drive storage.
D.
Store firewall logs to hard drive storage.
Answers
Suggested answer: A

Explanation:

The Security Management Server does not display policies and logs on the administrator's workstation. That is the function of the SmartConsole, which is a separate component that connects to the Security Management Server.Reference:Certified Security Administrator (CCSA) R81.20 Course Overview, page 4.

Total 401 questions
Go to page: of 41