ExamGecko
Home Home / Checkpoint / 156-315.81

Checkpoint 156-315.81 Practice Test - Questions Answers

Question list
Search
Search

To fully enable Dynamic Dispatcher with Firewall Priority Queues on a Security Gateway, run the following command in Expert mode then reboot:

A.
fw ctl multik set_mode 1
A.
fw ctl multik set_mode 1
Answers
B.
fw ctl Dynamic_Priority_Queue on
B.
fw ctl Dynamic_Priority_Queue on
Answers
C.
fw ctl Dynamic_Priority_Queue enable
C.
fw ctl Dynamic_Priority_Queue enable
Answers
D.
fw ctl multik set_mode 9
D.
fw ctl multik set_mode 9
Answers
Suggested answer: D

Explanation:

Dynamic Dispatcher is a feature that optimizes the performance of Security Gateways with multiple CPU cores by dynamically allocating traffic to different cores based on their load and priority. Firewall Priority Queues is a feature that prioritizes traffic based on its type and importance by assigning it to different queues with different weights and limits. To fully enable Dynamic Dispatcher with Firewall Priority Queues on a Security Gateway, you need to run the following command in Expert mode then reboot:

This command sets the multi-core mode to 9, which means that Dynamic Dispatcher is enabled with Firewall Priority Queues. The other commands are not valid or do not enable both features.

Reference:R81 Performance Tuning Administration Guide

Advanced Security Checkups can be easily conducted within:

A.
Reports
A.
Reports
Answers
B.
Advanced
B.
Advanced
Answers
C.
Checkups
C.
Checkups
Answers
D.
Views
D.
Views
Answers
E.
Summary
E.
Summary
Answers
Suggested answer: A

Explanation:

Advanced Security Checkups can be easily conducted within theReportstab in theLogs & Monitorview in SmartConsole. The Reports tab allows you to generate and view various reports that provide insights into the security status and performance of your network. You can use predefined reports or create custom reports based on your needs. You can also schedule reports to run automatically and send them by email. Some of the predefined reports that can help you conduct advanced security checkups are:

Security Overview: This report provides a summary of the security posture of your network, including the number and severity of incidents, the top attacked hosts and services, the top attackers and attack methods, the top detected threats and vulnerabilities, etc.

Security Best Practices: This report evaluates your security configuration and policy against the Check Point best practices and provides recommendations for improvement. It covers areas such as firewall policy, NAT policy, VPN policy, identity awareness, threat prevention, etc.

Compliance Status: This report assesses your compliance level with various regulations and standards, such as PCI DSS, ISO 27001, NIST 800-53, etc. It shows the compliance score, the compliance status of each requirement, the compliance status of each gateway and blade, etc.

Network Activity: This report shows the network activity and traffic patterns on your network, including the top sources and destinations of traffic, the top protocols and applications used, the top bandwidth consumers, etc.

System Health: This report monitors the health and performance of your management server and gateways, including the CPU utilization, memory usage, disk space, network interfaces, etc.

Reference:R81 Logging and Monitoring Administration Guide

What is the limitation of employing Sticky Decision Function?

A.
With SDF enabled, the involved VPN Gateways only supports IKEv1
A.
With SDF enabled, the involved VPN Gateways only supports IKEv1
Answers
B.
Acceleration technologies, such as SecureXL and CoreXL are disabled when activating SDF
B.
Acceleration technologies, such as SecureXL and CoreXL are disabled when activating SDF
Answers
C.
With SDF enabled, only ClusterXL in legacy mode is supported
C.
With SDF enabled, only ClusterXL in legacy mode is supported
Answers
D.
With SDF enabled, you can only have three Sync interfaces at most
D.
With SDF enabled, you can only have three Sync interfaces at most
Answers
Suggested answer: B

Explanation:

Sticky Decision Function (SDF) is a feature that ensures that VPN traffic is handled by the same core on a Security Gateway with multiple CPU cores. This improves the performance and stability of VPN tunnels by avoiding out-of-order packets and reducing encryption overhead. However, the limitation of employing SDF is that acceleration technologies, such as SecureXL and CoreXL are disabled when activating SDF. This means that SDF may reduce the overall throughput and scalability of the Security Gateway. Therefore, SDF should be used only when necessary and only on gateways that are dedicated to VPN traffic.

Reference:R81 Performance Tuning Administration Guide

How many images are included with Check Point TE appliance in Recommended Mode?

A.
2(OS) images
A.
2(OS) images
Answers
B.
images are chosen by administrator during installation
B.
images are chosen by administrator during installation
Answers
C.
as many as licensed for
C.
as many as licensed for
Answers
D.
the newest image
D.
the newest image
Answers
Suggested answer: A

Explanation:

The Check Point TE appliance in Recommended Mode includes2(OS) images. One image is used for running the appliance, and the other image is used for backup and recovery purposes. The images are not chosen by the administrator during installation, nor based on the license or the latest version.

Reference: [Check Point R81 Threat Emulation Administration Guide]

You have existing dbedit scripts from R77. Can you use them with R81.20?

A.
dbedit is not supported in R81.20
A.
dbedit is not supported in R81.20
Answers
B.
dbedit is fully supported in R81.20
B.
dbedit is fully supported in R81.20
Answers
C.
You can use dbedit to modify threat prevention or access policies, but not create or modify layers
C.
You can use dbedit to modify threat prevention or access policies, but not create or modify layers
Answers
D.
dbedit scripts are being replaced by mgmt_cli in R81.20
D.
dbedit scripts are being replaced by mgmt_cli in R81.20
Answers
Suggested answer: D

Explanation:

In R81.20, dbedit scripts are being replaced by the mgmt_cli utility for managing and configuring security policies and objects. Here's an explanation of each option:

A) dbedit is not supported in R81.20: This is not entirely accurate. While dbedit is still available and functional in R81.20, it is being phased out in favor of mgmt_cli for policy and object management.

B) dbedit is fully supported in R81.20: This statement is not accurate because although dbedit can still be used, it is not the primary recommended tool for policy management in R81.20.

C) You can use dbedit to modify threat prevention or access policies, but not create or modify layers: This statement is partially true, but it does not provide the complete picture. You can use dbedit for some policy-related tasks, but it's not the primary tool for policy management in R81.20.

D) dbedit scripts are being replaced by mgmt_cli in R81.20: This is the correct and recommended approach. mgmt_cli is the primary tool for managing security policies and objects in R81.20, and it is gradually replacing dbedit for these tasks.

Therefore, option D is the most accurate and recommended answer.

Which Remote Access Client does not provide an Office-Mode Address?

A.
SecuRemote
A.
SecuRemote
Answers
B.
Endpoint Security Suite
B.
Endpoint Security Suite
Answers
C.
Endpoint Security VPN
C.
Endpoint Security VPN
Answers
D.
Check Point Mobile
D.
Check Point Mobile
Answers
Suggested answer: A

Explanation:

In the context of Check Point remote access clients and Office Mode, the correct answer is:

A) SecuRemote: SecuRemote is a Check Point remote access client that does not provide an Office-Mode Address. Office Mode is a feature that assigns a unique IP address from a designated IP pool to remote users when they connect to the corporate network. SecuRemote does not support this feature.

B) Endpoint Security Suite, C. Endpoint Security VPN, and D. Check Point Mobile are remote access clients that support Office Mode and can provide an Office-Mode Address to remote users.

Therefore, option A is the correct answer as it correctly identifies a remote access client that does not provide an Office-Mode Address.

What is the command to see cluster status in cli expert mode?

A.
fw ctl stat
A.
fw ctl stat
Answers
B.
clusterXL stat
B.
clusterXL stat
Answers
C.
clusterXL status
C.
clusterXL status
Answers
D.
cphaprob stat
D.
cphaprob stat
Answers
Suggested answer: D

Explanation:

To see the cluster status in CLI expert mode, you can use the command cphaprob stat. This command displays the status of the Check Point High Availability cluster. It provides information about the state of the cluster members, such as 'Active,' 'Standby,' or 'Collision.'

As a valid Mobile Access Method, what feature provides Capsule Connect/VPN?

A.
That is used to deploy the mobile device as a generator of one-time passwords for authenticating to an RSA Authentication Manager.
A.
That is used to deploy the mobile device as a generator of one-time passwords for authenticating to an RSA Authentication Manager.
Answers
B.
Fill Layer4 VPN --SSL VPN that gives users network access to all mobile applications.
B.
Fill Layer4 VPN --SSL VPN that gives users network access to all mobile applications.
Answers
C.
Full Layer3 VPN --IPSec VPN that gives users network access to all mobile applications.
C.
Full Layer3 VPN --IPSec VPN that gives users network access to all mobile applications.
Answers
D.
You can make sure that documents are sent to the intended recipients only.
D.
You can make sure that documents are sent to the intended recipients only.
Answers
Suggested answer: C

Explanation:

The feature that provides Full Layer3 VPN --IPSec VPN, giving users network access to all mobile applications, is the correct answer.

Capsule Connect/VPN is used to establish secure VPN connections for mobile devices, and the Full Layer3 VPN (IPSec VPN) option provides comprehensive network access.

You find one of your cluster gateways showing ''Down'' when you run the ''cphaprob stat'' command. You then run the ''clusterXL_admin up'' on the down member but unfortunately the member continues to show down. What command do you run to determine the cause?

A.
cphaprob --f register
A.
cphaprob --f register
Answers
B.
cphaprob --d --s report
B.
cphaprob --d --s report
Answers
C.
cpstat --f all
C.
cpstat --f all
Answers
D.
cphaprob --a list
D.
cphaprob --a list
Answers
Suggested answer: D

Explanation:

To determine the cause of a cluster gateway showing 'Down' despite running 'clusterXL_admin up' on the down member, you can run the following command:

This command will provide a list of cluster members along with their statuses and can help diagnose the issue with the down member.

In SmartEvent, what are the different types of automatic reactions that the administrator can configure?

A.
Mail, Block Source, Block Event Activity, External Script, SNMP Trap
A.
Mail, Block Source, Block Event Activity, External Script, SNMP Trap
Answers
B.
Mail, Block Source, Block Destination, Block Services, SNMP Trap
B.
Mail, Block Source, Block Destination, Block Services, SNMP Trap
Answers
C.
Mail, Block Source, Block Destination, External Script, SNMP Trap
C.
Mail, Block Source, Block Destination, External Script, SNMP Trap
Answers
D.
Mail, Block Source, Block Event Activity, Packet Capture, SNMP Trap
D.
Mail, Block Source, Block Event Activity, Packet Capture, SNMP Trap
Answers
Suggested answer: A

Explanation:

In SmartEvent, the administrator can configure different types of automatic reactions, which include:

Mail notifications

Blocking the source of the event

Blocking the event activity

Running an external script

Sending an SNMP trap

So, the correct answer is 'Mail, Block Source, Block Event Activity, External Script, SNMP Trap.'

Total 626 questions
Go to page: of 63