ExamGecko
Home / Checkpoint / 156-315.81 / List of questions
Ask Question

Checkpoint 156-315.81 Practice Test - Questions Answers

List of questions

Question 1

Report Export Collapse

To fully enable Dynamic Dispatcher with Firewall Priority Queues on a Security Gateway, run the following command in Expert mode then reboot:

fw ctl multik set_mode 1
fw ctl multik set_mode 1
fw ctl Dynamic_Priority_Queue on
fw ctl Dynamic_Priority_Queue on
fw ctl Dynamic_Priority_Queue enable
fw ctl Dynamic_Priority_Queue enable
fw ctl multik set_mode 9
fw ctl multik set_mode 9
Suggested answer: D
Explanation:

Dynamic Dispatcher is a feature that optimizes the performance of Security Gateways with multiple CPU cores by dynamically allocating traffic to different cores based on their load and priority. Firewall Priority Queues is a feature that prioritizes traffic based on its type and importance by assigning it to different queues with different weights and limits. To fully enable Dynamic Dispatcher with Firewall Priority Queues on a Security Gateway, you need to run the following command in Expert mode then reboot:

Checkpoint 156-315.81 image Question 1 explanation 11409 09162024015605000000

This command sets the multi-core mode to 9, which means that Dynamic Dispatcher is enabled with Firewall Priority Queues. The other commands are not valid or do not enable both features.

Reference:R81 Performance Tuning Administration Guide

asked 16/09/2024
Houshang Ardekani
39 questions

Question 2

Report Export Collapse

Advanced Security Checkups can be easily conducted within:

Reports
Reports
Advanced
Advanced
Checkups
Checkups
Views
Views
Summary
Summary
Suggested answer: A
Explanation:

Advanced Security Checkups can be easily conducted within theReportstab in theLogs & Monitorview in SmartConsole. The Reports tab allows you to generate and view various reports that provide insights into the security status and performance of your network. You can use predefined reports or create custom reports based on your needs. You can also schedule reports to run automatically and send them by email. Some of the predefined reports that can help you conduct advanced security checkups are:

Security Overview: This report provides a summary of the security posture of your network, including the number and severity of incidents, the top attacked hosts and services, the top attackers and attack methods, the top detected threats and vulnerabilities, etc.

Security Best Practices: This report evaluates your security configuration and policy against the Check Point best practices and provides recommendations for improvement. It covers areas such as firewall policy, NAT policy, VPN policy, identity awareness, threat prevention, etc.

Compliance Status: This report assesses your compliance level with various regulations and standards, such as PCI DSS, ISO 27001, NIST 800-53, etc. It shows the compliance score, the compliance status of each requirement, the compliance status of each gateway and blade, etc.

Network Activity: This report shows the network activity and traffic patterns on your network, including the top sources and destinations of traffic, the top protocols and applications used, the top bandwidth consumers, etc.

System Health: This report monitors the health and performance of your management server and gateways, including the CPU utilization, memory usage, disk space, network interfaces, etc.

Reference:R81 Logging and Monitoring Administration Guide

asked 16/09/2024
Daniel Yamamoto
43 questions

Question 3

Report Export Collapse

What is the limitation of employing Sticky Decision Function?

With SDF enabled, the involved VPN Gateways only supports IKEv1
With SDF enabled, the involved VPN Gateways only supports IKEv1
Acceleration technologies, such as SecureXL and CoreXL are disabled when activating SDF
Acceleration technologies, such as SecureXL and CoreXL are disabled when activating SDF
With SDF enabled, only ClusterXL in legacy mode is supported
With SDF enabled, only ClusterXL in legacy mode is supported
With SDF enabled, you can only have three Sync interfaces at most
With SDF enabled, you can only have three Sync interfaces at most
Suggested answer: B
Explanation:

Sticky Decision Function (SDF) is a feature that ensures that VPN traffic is handled by the same core on a Security Gateway with multiple CPU cores. This improves the performance and stability of VPN tunnels by avoiding out-of-order packets and reducing encryption overhead. However, the limitation of employing SDF is that acceleration technologies, such as SecureXL and CoreXL are disabled when activating SDF. This means that SDF may reduce the overall throughput and scalability of the Security Gateway. Therefore, SDF should be used only when necessary and only on gateways that are dedicated to VPN traffic.

Reference:R81 Performance Tuning Administration Guide

asked 16/09/2024
Sanjiv Cumar
38 questions

Question 4

Report Export Collapse

How many images are included with Check Point TE appliance in Recommended Mode?

2(OS) images
2(OS) images
images are chosen by administrator during installation
images are chosen by administrator during installation
as many as licensed for
as many as licensed for
the newest image
the newest image
Suggested answer: A
Explanation:

The Check Point TE appliance in Recommended Mode includes2(OS) images. One image is used for running the appliance, and the other image is used for backup and recovery purposes. The images are not chosen by the administrator during installation, nor based on the license or the latest version.

Reference: [Check Point R81 Threat Emulation Administration Guide]

asked 16/09/2024
Instel SL
28 questions

Question 5

Report Export Collapse

You have existing dbedit scripts from R77. Can you use them with R81.20?

dbedit is not supported in R81.20
dbedit is not supported in R81.20
dbedit is fully supported in R81.20
dbedit is fully supported in R81.20
You can use dbedit to modify threat prevention or access policies, but not create or modify layers
You can use dbedit to modify threat prevention or access policies, but not create or modify layers
dbedit scripts are being replaced by mgmt_cli in R81.20
dbedit scripts are being replaced by mgmt_cli in R81.20
Suggested answer: D
Explanation:

In R81.20, dbedit scripts are being replaced by the mgmt_cli utility for managing and configuring security policies and objects. Here's an explanation of each option:

A) dbedit is not supported in R81.20: This is not entirely accurate. While dbedit is still available and functional in R81.20, it is being phased out in favor of mgmt_cli for policy and object management.

B) dbedit is fully supported in R81.20: This statement is not accurate because although dbedit can still be used, it is not the primary recommended tool for policy management in R81.20.

C) You can use dbedit to modify threat prevention or access policies, but not create or modify layers: This statement is partially true, but it does not provide the complete picture. You can use dbedit for some policy-related tasks, but it's not the primary tool for policy management in R81.20.

D) dbedit scripts are being replaced by mgmt_cli in R81.20: This is the correct and recommended approach. mgmt_cli is the primary tool for managing security policies and objects in R81.20, and it is gradually replacing dbedit for these tasks.

Therefore, option D is the most accurate and recommended answer.

asked 16/09/2024
Ramesh Kumar Patel
32 questions

Question 6

Report Export Collapse

Which Remote Access Client does not provide an Office-Mode Address?

SecuRemote
SecuRemote
Endpoint Security Suite
Endpoint Security Suite
Endpoint Security VPN
Endpoint Security VPN
Check Point Mobile
Check Point Mobile
Suggested answer: A
Explanation:

In the context of Check Point remote access clients and Office Mode, the correct answer is:

A) SecuRemote: SecuRemote is a Check Point remote access client that does not provide an Office-Mode Address. Office Mode is a feature that assigns a unique IP address from a designated IP pool to remote users when they connect to the corporate network. SecuRemote does not support this feature.

B) Endpoint Security Suite, C. Endpoint Security VPN, and D. Check Point Mobile are remote access clients that support Office Mode and can provide an Office-Mode Address to remote users.

Therefore, option A is the correct answer as it correctly identifies a remote access client that does not provide an Office-Mode Address.

asked 16/09/2024
Fadi Iraqi
37 questions

Question 7

Report Export Collapse

What is the command to see cluster status in cli expert mode?

fw ctl stat
fw ctl stat
clusterXL stat
clusterXL stat
clusterXL status
clusterXL status
cphaprob stat
cphaprob stat
Suggested answer: D
Explanation:

To see the cluster status in CLI expert mode, you can use the command cphaprob stat. This command displays the status of the Check Point High Availability cluster. It provides information about the state of the cluster members, such as 'Active,' 'Standby,' or 'Collision.'

asked 16/09/2024
Aldays Kausiona
43 questions

Question 8

Report Export Collapse

As a valid Mobile Access Method, what feature provides Capsule Connect/VPN?

That is used to deploy the mobile device as a generator of one-time passwords for authenticating to an RSA Authentication Manager.
That is used to deploy the mobile device as a generator of one-time passwords for authenticating to an RSA Authentication Manager.
Fill Layer4 VPN --SSL VPN that gives users network access to all mobile applications.
Fill Layer4 VPN --SSL VPN that gives users network access to all mobile applications.
Full Layer3 VPN --IPSec VPN that gives users network access to all mobile applications.
Full Layer3 VPN --IPSec VPN that gives users network access to all mobile applications.
You can make sure that documents are sent to the intended recipients only.
You can make sure that documents are sent to the intended recipients only.
Suggested answer: C
Explanation:

The feature that provides Full Layer3 VPN --IPSec VPN, giving users network access to all mobile applications, is the correct answer.

Capsule Connect/VPN is used to establish secure VPN connections for mobile devices, and the Full Layer3 VPN (IPSec VPN) option provides comprehensive network access.

asked 16/09/2024
BETTE SLETTER
35 questions

Question 9

Report Export Collapse

You find one of your cluster gateways showing ''Down'' when you run the ''cphaprob stat'' command. You then run the ''clusterXL_admin up'' on the down member but unfortunately the member continues to show down. What command do you run to determine the cause?

cphaprob --f register
cphaprob --f register
cphaprob --d --s report
cphaprob --d --s report
cpstat --f all
cpstat --f all
cphaprob --a list
cphaprob --a list
Suggested answer: D
Explanation:

To determine the cause of a cluster gateway showing 'Down' despite running 'clusterXL_admin up' on the down member, you can run the following command:

Checkpoint 156-315.81 image Question 9 explanation 11417 09162024015605000000

This command will provide a list of cluster members along with their statuses and can help diagnose the issue with the down member.

asked 16/09/2024
Renaldo Williams
43 questions

Question 10

Report Export Collapse

In SmartEvent, what are the different types of automatic reactions that the administrator can configure?

Mail, Block Source, Block Event Activity, External Script, SNMP Trap
Mail, Block Source, Block Event Activity, External Script, SNMP Trap
Mail, Block Source, Block Destination, Block Services, SNMP Trap
Mail, Block Source, Block Destination, Block Services, SNMP Trap
Mail, Block Source, Block Destination, External Script, SNMP Trap
Mail, Block Source, Block Destination, External Script, SNMP Trap
Mail, Block Source, Block Event Activity, Packet Capture, SNMP Trap
Mail, Block Source, Block Event Activity, Packet Capture, SNMP Trap
Suggested answer: A
Explanation:

In SmartEvent, the administrator can configure different types of automatic reactions, which include:

Mail notifications

Blocking the source of the event

Blocking the event activity

Running an external script

Sending an SNMP trap

So, the correct answer is 'Mail, Block Source, Block Event Activity, External Script, SNMP Trap.'

asked 16/09/2024
Vasuki Pramod Kara
26 questions
Total 626 questions
Go to page: of 63