ExamGecko
Home Home / Checkpoint / 156-315.81

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 10

Question list
Search
Search

The following command is used to verify the CPUSE version:

A.
HostName:0>show installer status build
A.
HostName:0>show installer status build
Answers
B.
[Expert@HostName:0]#show installer status
B.
[Expert@HostName:0]#show installer status
Answers
C.
[Expert@HostName:0]#show installer status build
C.
[Expert@HostName:0]#show installer status build
Answers
D.
HostName:0>show installer build
D.
HostName:0>show installer build
Answers
Suggested answer: A

Explanation:

The correct command to verify the CPUSE (Check Point Update Service Engine) version is:

Option B is incorrect because it uses the '[Expert@HostName:0]#' prompt, which is typically used for expert mode commands, but the CPUSE version can be checked using the 'show installer status build' command in standard mode.

Option C is incorrect because it uses the '[Expert@HostName:0]#' prompt, and while it includes the 'build' parameter, it's not the standard command to check the CPUSE version.

Option D is incorrect because it uses the 'HostName:0>' prompt, but it lacks the 'show' command and uses 'build' instead of 'status build.'

What is the difference between an event and a log?

A.
Events are generated at gateway according to Event Policy
A.
Events are generated at gateway according to Event Policy
Answers
B.
A log entry becomes an event when it matches any rule defined in Event Policy
B.
A log entry becomes an event when it matches any rule defined in Event Policy
Answers
C.
Events are collected with SmartWorkflow form Trouble Ticket systems
C.
Events are collected with SmartWorkflow form Trouble Ticket systems
Answers
D.
Log and Events are synonyms
D.
Log and Events are synonyms
Answers
Suggested answer: B

Explanation:

The difference between an event and a log is that a log entry becomes an event when it matches any rule defined in Event Policy. A log entry is a record of a network activity that is generated by a Security Gateway or a Management Server. An event is a log entry that meets certain criteria and triggers an action or a notification. The other options are either not true or not accurate definitions of events and logs.

Reference: Check Point R81 Logging and Monitoring Administration Guide

What are the attributes that SecureXL will check after the connection is allowed by Security Policy?

A.
Source address, Destination address, Source port, Destination port, Protocol
A.
Source address, Destination address, Source port, Destination port, Protocol
Answers
B.
Source MAC address, Destination MAC address, Source port, Destination port, Protocol
B.
Source MAC address, Destination MAC address, Source port, Destination port, Protocol
Answers
C.
Source address, Destination address, Source port, Destination port
C.
Source address, Destination address, Source port, Destination port
Answers
D.
Source address, Destination address, Destination port, Protocol
D.
Source address, Destination address, Destination port, Protocol
Answers
Suggested answer: A

Explanation:

The attributes that SecureXL will check after the connection is allowed by Security Policy areSource address, Destination address, Source port, Destination port, Protocol. These are the five tuple parameters that define a connection and are used by SecureXL to accelerate the traffic.The other options are either missing some of the parameters or include irrelevant ones, such as MAC addresses1.

Reference:Check Point R81 SecureXL Administration Guide

Which statement is NOT TRUE about Delta synchronization?

A.
Using UDP Multicast or Broadcast on port 8161
A.
Using UDP Multicast or Broadcast on port 8161
Answers
B.
Using UDP Multicast or Broadcast on port 8116
B.
Using UDP Multicast or Broadcast on port 8116
Answers
C.
Quicker than Full sync
C.
Quicker than Full sync
Answers
D.
Transfers changes in the Kernel tables between cluster members.
D.
Transfers changes in the Kernel tables between cluster members.
Answers
Suggested answer: A

Explanation:

The statement that is not true about Delta synchronization isUsing UDP Multicast or Broadcast on port 8161. Delta synchronization is a mechanism that transfers only the changes in the kernel tables between cluster members, instead of sending the entire tables.It uses UDP Multicast or Broadcast on port8116, not 81612. The other statements are true about Delta synchronization.

Reference:Check Point R81 ClusterXL Administration Guide

The Event List within the Event tab contains:

A.
a list of options available for running a query.
A.
a list of options available for running a query.
Answers
B.
the top events, destinations, sources, and users of the query results, either as a chart or in a tallied list.
B.
the top events, destinations, sources, and users of the query results, either as a chart or in a tallied list.
Answers
C.
events generated by a query.
C.
events generated by a query.
Answers
D.
the details of a selected event.
D.
the details of a selected event.
Answers
Suggested answer: C

Explanation:

The Event List within the Event tab containsevents generated by a query. The Event List shows the events that match the query criteria, such as time range, filter, and aggregation.The events can be sorted by different columns, such as severity, time, action, and source3. The other options are either not part of the Event tab or not related to the Event List.

Reference:Check Point R81 Logging and Monitoring Administration Guide

Which statement is correct about the Sticky Decision Function?

A.
It is not supported with either the Performance pack of a hardware based accelerator card
A.
It is not supported with either the Performance pack of a hardware based accelerator card
Answers
B.
Does not support SPI's when configured for Load Sharing
B.
Does not support SPI's when configured for Load Sharing
Answers
C.
It is automatically disabled if the Mobile Access Software Blade is enabled on the cluster
C.
It is automatically disabled if the Mobile Access Software Blade is enabled on the cluster
Answers
D.
It is not required L2TP traffic
D.
It is not required L2TP traffic
Answers
Suggested answer: A

Explanation:

The statement that is correct about the Sticky Decision Function isIt is not supported with either the Performance pack of a hardware based accelerator card. The Sticky Decision Function (SDF) is a feature that ensures that packets from the same connection are handled by the same cluster member in a Load Sharing configuration.However, SDF is not compatible with SecureXL acceleration, which is enabled by default or by using a Performance pack or a hardware based accelerator card4. The other statements are either incorrect or outdated about SDF.

Reference:Check Point R81 ClusterXL Administration Guide,Sticky Decision Function - Check Point CheckMates

Which statement is true regarding redundancy?

A.
System Administrators know when their cluster has failed over and can also see why it failed over by using the cphaprob --f if command.
A.
System Administrators know when their cluster has failed over and can also see why it failed over by using the cphaprob --f if command.
Answers
B.
ClusterXL offers three different Load Sharing solutions: Unicast, Broadcast, and Multicast.
B.
ClusterXL offers three different Load Sharing solutions: Unicast, Broadcast, and Multicast.
Answers
C.
Machines in a ClusterXL High Availability configuration must be synchronized.
C.
Machines in a ClusterXL High Availability configuration must be synchronized.
Answers
D.
Both ClusterXL and VRRP are fully supported by Gaia and available to all Check Point appliances, open servers, and virtualized environments.
D.
Both ClusterXL and VRRP are fully supported by Gaia and available to all Check Point appliances, open servers, and virtualized environments.
Answers
Suggested answer: D

Explanation:

The statement that is true regarding redundancy isBoth ClusterXL and VRRP are fully supported by Gaia and available to all Check Point appliances, open servers, and virtualized environments. ClusterXL and VRRP are two technologies that provide high availability and load sharing for Security Gateways.They are both supported by Gaia OS and can be deployed on various platforms5. The other statements are either false or incomplete regarding redundancy.

Reference:Check Point R81 ClusterXL Administration Guide, Check Point R81 Gaia Administration Guide

NAT rules are prioritized in which order?

1. Automatic Static NAT

2. Automatic Hide NAT

3. Manual/Pre-Automatic NAT

4. Post-Automatic/Manual NAT rules

A.
1, 2, 3, 4
A.
1, 2, 3, 4
Answers
B.
1, 4, 2, 3
B.
1, 4, 2, 3
Answers
C.
3, 1, 2, 4
C.
3, 1, 2, 4
Answers
D.
4, 3, 1, 2
D.
4, 3, 1, 2
Answers
Suggested answer: A

Explanation:

NAT rules are prioritized in the following order:

Automatic Static NAT: This is the highest priority NAT rule and it translates the source or destination IP address to a different IP address without changing the port number. It is configured in the network object properties.

Automatic Hide NAT: This is the second highest priority NAT rule and it translates the source IP address and port number to a different IP address and port number. It is configured in the network object properties.

Manual/Pre-Automatic NAT: This is the third highest priority NAT rule and it allows you to create custom NAT rules that are not possible with automatic NAT. It is configured in the NAT policy rulebase before the automatic NAT rules.

Post-Automatic/Manual NAT rules: This is the lowest priority NAT rule and it allows you to create custom NAT rules that are not possible with automatic NAT. It is configured in the NAT policy rulebase after the automatic NAT rules.

In R81, how do you manage your Mobile Access Policy?

A.
Through the Unified Policy
A.
Through the Unified Policy
Answers
B.
Through the Mobile Console
B.
Through the Mobile Console
Answers
C.
From SmartDashboard
C.
From SmartDashboard
Answers
D.
From the Dedicated Mobility Tab
D.
From the Dedicated Mobility Tab
Answers
Suggested answer: A

Explanation:

In R81, you can manage your Mobile Access Policy through the Unified Policy. The Unified Policy is a single policy that combines access control, threat prevention, data protection, and identity awareness. You can create rules for mobile access in the Unified Policy rulebase and apply them to mobile devices, users, and applications. You can also use the Mobile Access blade to configure additional settings for mobile access, such as authentication methods, VPN settings, and application portal.

R81.20 management server can manage gateways with which versions installed?

A.
Versions R77 and higher
A.
Versions R77 and higher
Answers
B.
Versions R76 and higher
B.
Versions R76 and higher
Answers
C.
Versions R75.20 and higher
C.
Versions R75.20 and higher
Answers
D.
Versions R75 and higher
D.
Versions R75 and higher
Answers
Suggested answer: C

Explanation:

R81.20 management server can manage gateways with versions R75.20 and higher. However, some features may not be supported on older gateway versions. For example, R81 introduces a new feature called Infinity Threat Prevention, which requires R81 gateways to work properly. Therefore, it is recommended to upgrade your gateways to the latest version to take advantage of all the new features and enhancements in R81.

Total 626 questions
Go to page: of 63