ExamGecko
Home / Checkpoint / 156-215.81 / List of questions
Ask Question

Checkpoint 156-215.81 Practice Test - Questions Answers, Page 9

Add to Whishlist

List of questions

Question 81

Report Export Collapse

What is the SOLR database for?

Used for full text search and enables powerful matching capabilities
Used for full text search and enables powerful matching capabilities
Writes data to the database and full text search
Writes data to the database and full text search
Serves GUI responsible to transfer request to the DLE server
Serves GUI responsible to transfer request to the DLE server
Enables powerful matching capabilities and writes data to the database
Enables powerful matching capabilities and writes data to the database
Suggested answer: A
Explanation:

The SOLR database is used for full text search and enables powerful matching capabilities3. SOLR is an open source enterprise search platform that provides fast and scalable indexing and searching of data. It supports advanced features such as faceting, highlighting, spell checking, synonyms, etc.The SOLR database is used by Check Point products such as SmartLog and SmartEvent to store and query logs and events3. The other options are incorrect. Option B is false, as SOLR does not write data to the database, but only reads data from it. Option C is false, as SOLR does not serve GUI, but only provides a RESTful API for queries. Option D is false, as SOLR does not enable powerful matching capabilities and write data to the database, but only enables powerful matching capabilities.

Reference:SOLR - Check Point Software, [Apache Solr]

asked 16/09/2024
Maris Romans
35 questions

Question 82

Report Export Collapse

Which of the following commands is used to monitor cluster members?

cphaprob state
cphaprob state
cphaprob status
cphaprob status
cphaprob
cphaprob
cluster state
cluster state
Suggested answer: A
Explanation:

The command that is used to monitor cluster members iscphaprob state. This command shows the state of each cluster member (Active, Standby, Down, etc.) and the reason for the state (OK, HA Failure, CCP Failure, etc.). It also shows the state synchronization status (Synchronized or Not Synchronized) and the uptime of each cluster member. The other options are incorrect. Option B is a command to show the status of cluster services, not cluster members. Option C is not a valid command by itself, as it requires an argument such asstate,status,list, etc. Option D is not a valid command at all.

Reference: [cphaprob]

asked 16/09/2024
takasuka masahide
43 questions

Question 83

Report Export Collapse

Fill in the blank: Service blades must be attached to a ______________.

Security Gateway
Security Gateway
Management container
Management container
Management server
Management server
Security Gateway container
Security Gateway container
Suggested answer: A
Explanation:

Service blades must be attached to a Security Gateway. A Security Gateway is a device that enforces security policies on traffic that passes through it. A service blade is a software module that provides a specific security function, such as firewall, VPN, IPS, etc. A Security Gateway can have one or more service blades attached to it, depending on the license and hardware capabilities. The other options are incorrect. A management container is a virtualized environment that hosts a Security Management Server or a Log Server. A management server is a device that manages security policies and distributes them to Security Gateways. A Security Gateway container is not a valid term in Check Point terminology.

Reference: [Check Point R81 Security Management Administration Guide], [Check Point R81 CloudGuard Administration Guide]

asked 16/09/2024
Najim Abdelmoula
51 questions

Question 84

Report Export Collapse

Fill in the blank: An LDAP server holds one or more ______________.

Server Units
Server Units
Administrator Units
Administrator Units
Account Units
Account Units
Account Servers
Account Servers
Suggested answer: C
Explanation:

An LDAP server holds one or more Account Units. An Account Unit is a logical representation of an LDAP server in the Check Point database. It defines the connection parameters, authentication methods, and user and group information that are retrieved from the LDAP server. An Account Unit allows the Security Gateway to use the LDAP server for user authentication and identity awareness. The other options are incorrect. A Server Unit is a logical representation of a Check Point server in the Check Point database. An Administrator Unit is a logical representation of an administrator or an administrator group in the Check Point database. An Account Server is not a valid term in Check Point terminology.

Reference: [Check Point R81 Identity Awareness Administration Guide], [Check Point R81 Security Management Administration Guide], [Check Point R81 SmartConsole R81 Resolved Issues]

asked 16/09/2024
Alexander Voronetsky
46 questions

Question 85

Report Export Collapse

Fill in the blank: In Security Gateways R75 and above, SIC uses ______________ for encryption.

AES-128
AES-128
AES-256
AES-256
DES
DES
3DES
3DES
Suggested answer: A
Explanation:

In Security Gateways R75 and above, SIC uses AES-128 for encryption. SIC stands for Secure Internal Communication, which is a mechanism that establishes trust between Check Point components, such as Security Gateways, Security Management Servers, Log Servers, etc. SIC uses certificates to authenticate and encrypt the communication between the components. AES-128 is an encryption algorithm that uses a 128-bit key to encrypt and decrypt data. The other options are incorrect. AES-256 is an encryption algorithm that uses a 256-bit key, but it is not used by SIC. DES and 3DES are older encryption algorithms that use 56-bit and 168-bit keys respectively, but they are not used by SIC either.

Reference: [Secure Internal Communication (SIC) between Check Point components], AES - Wikipedia, DES - Wikipedia, Triple DES - Wikipedia

asked 16/09/2024
Colin Huisman
41 questions

Question 86

Report Export Collapse

What protocol is specifically used for clustered environments?

Clustered Protocol
Clustered Protocol
Synchronized Cluster Protocol
Synchronized Cluster Protocol
Control Cluster Protocol
Control Cluster Protocol
Cluster Control Protocol
Cluster Control Protocol
Suggested answer: D
Explanation:

The protocol that is specifically used for clustered environments is Cluster Control Protocol (CCP). CCP is a proprietary Check Point protocol that is used for communication between cluster members and for cluster administration. CCP enables cluster members to exchange state information, synchronize connections, monitor interfaces, and perform failover operations. The other options are incorrect. Clustered Protocol, Synchronized Cluster Protocol, and Control Cluster Protocol are not valid terms in Check Point terminology.

Reference: [Cluster Control Protocol (CCP) - Check Point Software]

asked 16/09/2024
stephen mark
38 questions

Question 87

Report Export Collapse

Which of the following is NOT a tracking option? (Select three)

Partial log
Partial log
Log
Log
Network log
Network log
Full log
Full log
Suggested answer: A, C, D
Explanation:

The options that are not tracking options are Partial log, Network log, and Full log. Tracking options are settings that determine how the Security Gateway handles traffic that matches a rule in the security policy. The valid tracking options are Log, Detailed Log, Extended Log, Alert, Mail, SNMP trap, User Defined Alert, and None. The other options are incorrect. Log is a tracking option that records basic information about the traffic, such as source, destination, service, action, etc. Detailed Log is a tracking option that records additional information about the traffic, such as NAT details, data amount, etc. Extended Log is a tracking option that records even more information about the traffic, such as matched IPS protections, application details, etc.

Reference: [Logging and Monitoring Administration Guide R80 - Check Point Software]

asked 16/09/2024
Cristian Bello Henriquez
36 questions

Question 88

Report Export Collapse

Which command shows the installed licenses?

cplic print
cplic print
print cplic
print cplic
fwlic print
fwlic print
show licenses
show licenses
Suggested answer: A
Explanation:

The command that shows the installed licenses iscplic print. This command displays the license information on a Check Point server or Security Gateway. It shows the license type, expiration date, attached blades, etc. The other options are incorrect.print cplicis not a valid command.fwlic printis not a valid command.show licensesis not a valid command.

Reference: [How to check license status on SecurePlatform / Gaia from CLI]

asked 16/09/2024
TANVIR ANJUM
39 questions

Question 89

Report Export Collapse

Of all the Check Point components in your network, which one changes most often and should be backed up most frequently?

SmartManager
SmartManager
SmartConsole
SmartConsole
Security Gateway
Security Gateway
Security Management Server
Security Management Server
Suggested answer: D
Explanation:

The Security Management Server is the component that changes most often and should be backed up most frequently, because it stores all the security policies and configurations for the Check Point components in your network. The other components are either clients or gateways that do not change as frequently.

asked 16/09/2024
Osama Rahman
35 questions

Question 90

Report Export Collapse

Which option would allow you to make a backup copy of the OS and Check Point configuration, without stopping Check Point processes?

All options stop Check Point processes
All options stop Check Point processes
backup
backup
migrate export
migrate export
snapshot
snapshot
Suggested answer: D
Explanation:

The snapshot option would allow you to make a backup copy of the OS and Check Point configuration, without stopping Check Point processes. A snapshot is a full system backup, including network interfaces, routing tables, and Check Point products and configuration. The other options require stopping Check Point processes or do not backup the OS.

asked 16/09/2024
ben ebrahimi
43 questions
Total 401 questions
Go to page: of 41