ExamGecko
Home / Checkpoint / 156-215.81 / List of questions
Ask Question

Checkpoint 156-215.81 Practice Test - Questions Answers, Page 8

Add to Whishlist

List of questions

Question 71

Report Export Collapse

When an encrypted packet is decrypted, where does this happen?

Security policy
Security policy
Inbound chain
Inbound chain
Outbound chain
Outbound chain
Decryption is not supported
Decryption is not supported
Suggested answer: A
Explanation:

When an encrypted packet is decrypted, this happens in the security policy4. The security policy is a set of rules that defines how the Security Gateway inspects and secures traffic. The security policy includes VPN rules that specify which traffic should be encrypted or decrypted. The inbound and outbound chains are part of the inspection framework that processes packets according to the security policy.

Reference:Check Point R81 VPN Administration Guide

asked 16/09/2024
Krishna chaithanya
42 questions

Question 72

Report Export Collapse

Which of the following is NOT a component of Check Point Capsule?

Capsule Docs
Capsule Docs
Capsule Cloud
Capsule Cloud
Capsule Enterprise
Capsule Enterprise
Capsule Workspace
Capsule Workspace
Suggested answer: C
Explanation:

The components of Check Point Capsule are Capsule Docs, Capsule Cloud, and Capsule Workspace123. There is no Capsule Enterprise component. Capsule Docs protects business documents everywhere they go. Capsule Cloud protects mobile users outside the enterprise security perimeter. Capsule Workspace creates a secure business environment on mobile devices.

Reference:Check Point Capsule Datasheet,Check Point Capsule Workspace Datasheet,Mobile Secure Workspace with Capsule

asked 16/09/2024
benakli rabah
29 questions

Question 73

Report Export Collapse

You have successfully backed up your Check Point configurations without the OS information. What command would you use to restore this backup?

restore_backup
restore_backup
import backup
import backup
cp_merge
cp_merge
migrate import
migrate import
Suggested answer: A
Explanation:

The command to restore a backup of Check Point configurations without the OS information isrestore_backup4. This command restores the Gaia OS configuration and the firewall database from a compressed file. The other commands are not valid for this purpose.import backupis not a valid command.cp_mergeis a command to merge policies or objects from different databases.migrate importis a command to import a previously exported database usingmigrate export.

Reference:System Backup and Restore feature in Gaia, [cp_merge], [migrate import]

asked 16/09/2024
Sharankumar Nadarajah
42 questions

Question 74

Report Export Collapse

What is the best sync method in the ClusterXL deployment?

Use 1 cluster + 1st sync
Use 1 cluster + 1st sync
Use 1 dedicated sync interface
Use 1 dedicated sync interface
Use 3 clusters + 1st sync + 2nd sync + 3rd sync
Use 3 clusters + 1st sync + 2nd sync + 3rd sync
Use 2 clusters + 1st sync + 2nd sync
Use 2 clusters + 1st sync + 2nd sync
Suggested answer: B
Explanation:

The best sync method in the ClusterXL deployment is to use one dedicated sync interface56. This method provides optimal performance and reliability for synchronization traffic.Using multiple sync interfaces is not recommended as it increases CPU load and does not provide 100% sync redundancy5. Using multiple clusters is not a sync method, but a cluster topology.

Reference:Sync Redundancy in ClusterXL,Best Practice for HA sync interface

asked 16/09/2024
Andrea Trivisonno
35 questions

Question 75

Report Export Collapse

Can multiple administrators connect to a Security Management Server at the same time?

No, only one can be connected
No, only one can be connected
Yes, all administrators can modify a network object at the same time
Yes, all administrators can modify a network object at the same time
Yes, every administrator has their own username, and works in a session that is independent of other administrators
Yes, every administrator has their own username, and works in a session that is independent of other administrators
Yes, but only one has the right to write
Yes, but only one has the right to write
Suggested answer: C
Explanation:

Multiple administrators can connect to a Security Management Server at the same time, and each administrator has their own username and works in a session that is independent of other administrators1. This allows concurrent administration and prevents conflicts between different administrators. The other options are incorrect. Only one administrator can be connected is false. All administrators can modify a network object at the same time is false, as only one administrator can lock and edit an object at a time. Only one has the right to write is false, as all administrators have write permissions unless they are restricted by roles or permissions.

Reference:Security Management Server - Check Point Software

asked 16/09/2024
Samantha Carpenter
35 questions

Question 76

Report Export Collapse

What Identity Agent allows packet tagging and computer authentication?

Endpoint Security Client
Endpoint Security Client
Full Agent
Full Agent
Light Agent
Light Agent
System Agent
System Agent
Suggested answer: B
Explanation:

The Full Identity Agent allows packet tagging and computer authentication2. Packet tagging is a feature that enables the Security Gateway to identify the source user and machine of each packet, regardless of NAT or routing. Computer authentication is a feature that enables the Security Gateway to authenticate machines that are not associated with any user, such as servers or unattended workstations. The other options are incorrect. Endpoint Security Client is not an Identity Agent, but a software that provides endpoint security features such as firewall, antivirus, VPN, etc. Light Agent is an Identity Agent that does not require installation and runs on a web browser, but it does not support packet tagging or computer authentication. System Agent is not an Identity Agent, but a software that provides system information and health monitoring for endpoints.

Reference:Check Point Identity Agent for Microsoft Windows 10

asked 16/09/2024
Vanildo Pedro
45 questions

Question 77

Report Export Collapse

In Logging and Monitoring, the tracking options are Log, Detailed Log and Extended Log. Which of the following options can you add to each Log, Detailed Log and Extended Log?

Accounting
Accounting
Suppression
Suppression
Accounting/Suppression
Accounting/Suppression
Accounting/Extended
Accounting/Extended
Suggested answer: C
Explanation:

In Logging and Monitoring, the tracking options are Log, Detailed Log and Extended Log.You can add Accounting and/or Suppression to each of these options1. Accounting enables you to track the amount of data that is sent or received by a specific rule. Suppression enables you to reduce the number of logs that are generated by a specific rule. Therefore, the correct answer is C. Accounting/Suppression.

Reference:Logging and Monitoring Administration Guide R80 - Check Point Software

asked 16/09/2024
takasuka masahide
43 questions

Question 78

Report Export Collapse

You noticed that CPU cores on the Security Gateway are usually 100% utilized and many packets were dropped. You don't have a budget to perform a hardware upgrade at this time. To optimize drops you decide to use Priority Queues and fully enable Dynamic Dispatcher. How can you enable them?

fw ctl multik dynamic_dispatching on
fw ctl multik dynamic_dispatching on
fw ctl multik dynamic_dispatching set_mode 9
fw ctl multik dynamic_dispatching set_mode 9
fw ctl multik set_mode 9
fw ctl multik set_mode 9
fw ctl miltik pq enable
fw ctl miltik pq enable
Suggested answer: C
Explanation:

To optimize drops, you can use Priority Queues and fully enable Dynamic Dispatcher on the Security Gateway23. Priority Queues are a mechanism that prioritizes part of the traffic when the Security Gateway is stressed and needs to drop packets. Dynamic Dispatcher is a feature that dynamically assigns new connections to a CoreXL FW instance based on the utilization of CPU cores.To enable both features, you need to run the commandfw ctl multik set_mode 9on the Security Gateway4. Therefore, the correct answer is C.fw ctl multik set_mode 9.

Reference:CoreXL Dynamic Dispatcher - Check Point Software,Firewall Priority Queues in R80.x / R81.x - Check Point Software,Separate Config for Dynamic Dispatcher and Priority Queues

asked 16/09/2024
Mathijn Smit
49 questions

Question 79

Report Export Collapse

Which two of these Check Point Protocols are used by ?

ELA and CPD
ELA and CPD
FWD and LEA
FWD and LEA
FWD and CPLOG
FWD and CPLOG
ELA and CPLOG
ELA and CPLOG
Suggested answer: B
Explanation:

The two Check Point Protocols that are used by are FWD and LEA567. FWD is the Firewall Daemon that handles communication between different Check Point components, such as Security Management Server, Security Gateway, SmartConsole, etc. LEA is the Log Export API that allows external applications to retrieve logs from the Security Gateway or Security Management Server. Therefore, the correct answer is B. FWD and LEA.

Reference:Border Gateway Protocol - Check Point Software,Check Point IPS Datasheet,List of valid protocols for services? - Check Point CheckMates

asked 16/09/2024
Tudor Voicu
39 questions

Question 80

Report Export Collapse

To ensure that VMAC mode is enabled, which CLI command you should run on all cluster members? Choose the best answer.

fw ctl set int fwha vmac global param enabled
fw ctl set int fwha vmac global param enabled
fw ctl get int fwha vmac global param enabled; result of command should return value 1
fw ctl get int fwha vmac global param enabled; result of command should return value 1
cphaprob --a if
cphaprob --a if
fw ctl get int fwha_vmac_global_param_enabled; result of command should return value 1
fw ctl get int fwha_vmac_global_param_enabled; result of command should return value 1
Suggested answer: B
Explanation:

To ensure that VMAC mode is enabled, you should run the commandfw ctl get int fwha_vmac_global_param_enabledon all cluster members and check that the result of the command returns the value 11. This command shows the current value of the global kernel parameterfwha_vmac_global_param_enabled, which controls whether VMAC mode is enabled or disabled.VMAC mode is a feature that associates a Virtual MAC address with each Virtual IP address of the cluster, which reduces the need for Gratuitous ARP packets and improves failover performance1. The other options are incorrect. Option A is not a valid command.Option C is a command to show the status of cluster interfaces, not VMAC mode2.Option D is a command to show the value of a different global kernel parameter,fwha_vmac_global_param_enabled, which controls whether VMAC mode is enabled for all interfaces or only for non-VLAN interfaces1.

Reference:How to enable ClusterXL Virtual MAC (VMAC) mode,cphaprob

asked 16/09/2024
Kamran Kamran
49 questions
Total 401 questions
Go to page: of 41