ExamGecko
Home / Checkpoint / 156-315.81 / List of questions
Ask Question

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 10

Add to Whishlist

List of questions

Question 91

Report Export Collapse

The following command is used to verify the CPUSE version:

HostName:0>show installer status build
HostName:0>show installer status build
[Expert@HostName:0]#show installer status
[Expert@HostName:0]#show installer status
[Expert@HostName:0]#show installer status build
[Expert@HostName:0]#show installer status build
HostName:0>show installer build
HostName:0>show installer build
Suggested answer: A
Explanation:

The correct command to verify the CPUSE (Check Point Update Service Engine) version is:

Checkpoint 156-315.81 image Question 91 explanation 11499 09162024015605000000

Option B is incorrect because it uses the '[Expert@HostName:0]#' prompt, which is typically used for expert mode commands, but the CPUSE version can be checked using the 'show installer status build' command in standard mode.

Option C is incorrect because it uses the '[Expert@HostName:0]#' prompt, and while it includes the 'build' parameter, it's not the standard command to check the CPUSE version.

Option D is incorrect because it uses the 'HostName:0>' prompt, but it lacks the 'show' command and uses 'build' instead of 'status build.'

asked 16/09/2024
Brian Lester
46 questions

Question 92

Report Export Collapse

What is the difference between an event and a log?

Events are generated at gateway according to Event Policy
Events are generated at gateway according to Event Policy
A log entry becomes an event when it matches any rule defined in Event Policy
A log entry becomes an event when it matches any rule defined in Event Policy
Events are collected with SmartWorkflow form Trouble Ticket systems
Events are collected with SmartWorkflow form Trouble Ticket systems
Log and Events are synonyms
Log and Events are synonyms
Suggested answer: B
Explanation:

The difference between an event and a log is that a log entry becomes an event when it matches any rule defined in Event Policy. A log entry is a record of a network activity that is generated by a Security Gateway or a Management Server. An event is a log entry that meets certain criteria and triggers an action or a notification. The other options are either not true or not accurate definitions of events and logs.

Reference: Check Point R81 Logging and Monitoring Administration Guide

asked 16/09/2024
Ryan Campbell
32 questions

Question 93

Report Export Collapse

What are the attributes that SecureXL will check after the connection is allowed by Security Policy?

Source address, Destination address, Source port, Destination port, Protocol
Source address, Destination address, Source port, Destination port, Protocol
Source MAC address, Destination MAC address, Source port, Destination port, Protocol
Source MAC address, Destination MAC address, Source port, Destination port, Protocol
Source address, Destination address, Source port, Destination port
Source address, Destination address, Source port, Destination port
Source address, Destination address, Destination port, Protocol
Source address, Destination address, Destination port, Protocol
Suggested answer: A
Explanation:

The attributes that SecureXL will check after the connection is allowed by Security Policy areSource address, Destination address, Source port, Destination port, Protocol. These are the five tuple parameters that define a connection and are used by SecureXL to accelerate the traffic.The other options are either missing some of the parameters or include irrelevant ones, such as MAC addresses1.

Reference:Check Point R81 SecureXL Administration Guide

asked 16/09/2024
Jennifer Leon
47 questions

Question 94

Report Export Collapse

Which statement is NOT TRUE about Delta synchronization?

Using UDP Multicast or Broadcast on port 8161
Using UDP Multicast or Broadcast on port 8161
Using UDP Multicast or Broadcast on port 8116
Using UDP Multicast or Broadcast on port 8116
Quicker than Full sync
Quicker than Full sync
Transfers changes in the Kernel tables between cluster members.
Transfers changes in the Kernel tables between cluster members.
Suggested answer: A
Explanation:

The statement that is not true about Delta synchronization isUsing UDP Multicast or Broadcast on port 8161. Delta synchronization is a mechanism that transfers only the changes in the kernel tables between cluster members, instead of sending the entire tables.It uses UDP Multicast or Broadcast on port8116, not 81612. The other statements are true about Delta synchronization.

Reference:Check Point R81 ClusterXL Administration Guide

asked 16/09/2024
Thanh Phan
46 questions

Question 95

Report Export Collapse

The Event List within the Event tab contains:

a list of options available for running a query.
a list of options available for running a query.
the top events, destinations, sources, and users of the query results, either as a chart or in a tallied list.
the top events, destinations, sources, and users of the query results, either as a chart or in a tallied list.
events generated by a query.
events generated by a query.
the details of a selected event.
the details of a selected event.
Suggested answer: C
Explanation:

The Event List within the Event tab containsevents generated by a query. The Event List shows the events that match the query criteria, such as time range, filter, and aggregation.The events can be sorted by different columns, such as severity, time, action, and source3. The other options are either not part of the Event tab or not related to the Event List.

Reference:Check Point R81 Logging and Monitoring Administration Guide

asked 16/09/2024
EDDIE LIN
49 questions

Question 96

Report Export Collapse

Which statement is correct about the Sticky Decision Function?

It is not supported with either the Performance pack of a hardware based accelerator card
It is not supported with either the Performance pack of a hardware based accelerator card
Does not support SPI's when configured for Load Sharing
Does not support SPI's when configured for Load Sharing
It is automatically disabled if the Mobile Access Software Blade is enabled on the cluster
It is automatically disabled if the Mobile Access Software Blade is enabled on the cluster
It is not required L2TP traffic
It is not required L2TP traffic
Suggested answer: A
Explanation:

The statement that is correct about the Sticky Decision Function isIt is not supported with either the Performance pack of a hardware based accelerator card. The Sticky Decision Function (SDF) is a feature that ensures that packets from the same connection are handled by the same cluster member in a Load Sharing configuration.However, SDF is not compatible with SecureXL acceleration, which is enabled by default or by using a Performance pack or a hardware based accelerator card4. The other statements are either incorrect or outdated about SDF.

Reference:Check Point R81 ClusterXL Administration Guide,Sticky Decision Function - Check Point CheckMates

asked 16/09/2024
Mustapha Amine Atmani
56 questions

Question 97

Report Export Collapse

Which statement is true regarding redundancy?

System Administrators know when their cluster has failed over and can also see why it failed over by using the cphaprob --f if command.
System Administrators know when their cluster has failed over and can also see why it failed over by using the cphaprob --f if command.
ClusterXL offers three different Load Sharing solutions: Unicast, Broadcast, and Multicast.
ClusterXL offers three different Load Sharing solutions: Unicast, Broadcast, and Multicast.
Machines in a ClusterXL High Availability configuration must be synchronized.
Machines in a ClusterXL High Availability configuration must be synchronized.
Both ClusterXL and VRRP are fully supported by Gaia and available to all Check Point appliances, open servers, and virtualized environments.
Both ClusterXL and VRRP are fully supported by Gaia and available to all Check Point appliances, open servers, and virtualized environments.
Suggested answer: D
Explanation:

The statement that is true regarding redundancy isBoth ClusterXL and VRRP are fully supported by Gaia and available to all Check Point appliances, open servers, and virtualized environments. ClusterXL and VRRP are two technologies that provide high availability and load sharing for Security Gateways.They are both supported by Gaia OS and can be deployed on various platforms5. The other statements are either false or incomplete regarding redundancy.

Reference:Check Point R81 ClusterXL Administration Guide, Check Point R81 Gaia Administration Guide

asked 16/09/2024
Reaper Gamer
56 questions

Question 98

Report Export Collapse

NAT rules are prioritized in which order?

1. Automatic Static NAT

2. Automatic Hide NAT

3. Manual/Pre-Automatic NAT

4. Post-Automatic/Manual NAT rules

1, 2, 3, 4
1, 2, 3, 4
1, 4, 2, 3
1, 4, 2, 3
3, 1, 2, 4
3, 1, 2, 4
4, 3, 1, 2
4, 3, 1, 2
Suggested answer: A
Explanation:

NAT rules are prioritized in the following order:

Automatic Static NAT: This is the highest priority NAT rule and it translates the source or destination IP address to a different IP address without changing the port number. It is configured in the network object properties.

Automatic Hide NAT: This is the second highest priority NAT rule and it translates the source IP address and port number to a different IP address and port number. It is configured in the network object properties.

Manual/Pre-Automatic NAT: This is the third highest priority NAT rule and it allows you to create custom NAT rules that are not possible with automatic NAT. It is configured in the NAT policy rulebase before the automatic NAT rules.

Post-Automatic/Manual NAT rules: This is the lowest priority NAT rule and it allows you to create custom NAT rules that are not possible with automatic NAT. It is configured in the NAT policy rulebase after the automatic NAT rules.

asked 16/09/2024
Sasha Grib
39 questions

Question 99

Report Export Collapse

In R81, how do you manage your Mobile Access Policy?

Through the Unified Policy
Through the Unified Policy
Through the Mobile Console
Through the Mobile Console
From SmartDashboard
From SmartDashboard
From the Dedicated Mobility Tab
From the Dedicated Mobility Tab
Suggested answer: A
Explanation:

In R81, you can manage your Mobile Access Policy through the Unified Policy. The Unified Policy is a single policy that combines access control, threat prevention, data protection, and identity awareness. You can create rules for mobile access in the Unified Policy rulebase and apply them to mobile devices, users, and applications. You can also use the Mobile Access blade to configure additional settings for mobile access, such as authentication methods, VPN settings, and application portal.

asked 16/09/2024
OKAN AYDOΓ„ΕΎAN
52 questions

Question 100

Report Export Collapse

R81.20 management server can manage gateways with which versions installed?

Versions R77 and higher
Versions R77 and higher
Versions R76 and higher
Versions R76 and higher
Versions R75.20 and higher
Versions R75.20 and higher
Versions R75 and higher
Versions R75 and higher
Suggested answer: C
Explanation:

R81.20 management server can manage gateways with versions R75.20 and higher. However, some features may not be supported on older gateway versions. For example, R81 introduces a new feature called Infinity Threat Prevention, which requires R81 gateways to work properly. Therefore, it is recommended to upgrade your gateways to the latest version to take advantage of all the new features and enhancements in R81.

asked 16/09/2024
John Kaye
33 questions
Total 626 questions
Go to page: of 63