ExamGecko
Home Home / Checkpoint / 156-315.81

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 11

Question list
Search
Search

Which command can you use to verify the number of active concurrent connections?

A.
fw conn all
A.
fw conn all
Answers
B.
fw ctl pstat
B.
fw ctl pstat
Answers
C.
show all connections
C.
show all connections
Answers
D.
show connections
D.
show connections
Answers
Suggested answer: B

Explanation:

The commandfw ctl pstatcan be used to verify the number of active concurrent connections on a gateway. This command displays various statistics about the firewall kernel, such as memory usage, CPU utilization, packet rates, and connection table information. The output of this command includes a line that shows the current number of connections and the peak number of connections since the last reboot. For example:

This means that there are currently 1234 active connections out of a maximum of 8192 connections, which is 15% of the connection table capacity. The peak number of connections since the last reboot was 2345.

Which of the following statements is TRUE about R81 management plug-ins?

A.
The plug-in is a package installed on the Security Gateway.
A.
The plug-in is a package installed on the Security Gateway.
Answers
B.
Installing a management plug-in requires a Snapshot, just like any upgrade process.
B.
Installing a management plug-in requires a Snapshot, just like any upgrade process.
Answers
C.
A management plug-in interacts with a Security Management Server to provide new features and support for new products.
C.
A management plug-in interacts with a Security Management Server to provide new features and support for new products.
Answers
D.
Using a plug-in offers full central management only if special licensing is applied to specific features of the plug-in.
D.
Using a plug-in offers full central management only if special licensing is applied to specific features of the plug-in.
Answers
Suggested answer: C

Explanation:

A management plug-in is a software component that interacts with a Security Management Server to provide new features and support for new products. A management plug-in can extend the functionality of SmartConsole, SmartDashboard, SmartView Monitor, SmartView Tracker, SmartEvent, SmartReporter, SmartProvisioning, SmartUpdate, and other management tools. A management plug-in can also add new objects, policies, rules, actions, reports, views, and wizards to the management system. Some examples of management plug-ins are CloudGuard Controller, SandBlast Agent, Endpoint Security Server, Threat Extraction for Web, etc.

How can SmartView application accessed?

A.
http://<Security Management IP Address>/smartview
A.
http://<Security Management IP Address>/smartview
Answers
B.
http://<Security Management IP Address>:4434/smartview/
B.
http://<Security Management IP Address>:4434/smartview/
Answers
C.
https://<Security Management IP Address>/smartview/
C.
https://<Security Management IP Address>/smartview/
Answers
D.
https://<Security Management host name>:4434/smartview/
D.
https://<Security Management host name>:4434/smartview/
Answers
Suggested answer: C

Explanation:

SmartView is a web-based application that allows you to view and analyze logs, reports, and events from multiple Check Point products. You can access SmartView by using the following URL:

You need to use HTTPS protocol and the default port 443. You also need to enter the IP address of the Security Management Server that hosts the SmartView application. You cannot use the host name of the Security Management Server or a different port number.

Reference:SmartView R81 Administration Guide

What command verifies that the API server is responding?

A.
api stat
A.
api stat
Answers
B.
api status
B.
api status
Answers
C.
show api_status
C.
show api_status
Answers
D.
app_get_status
D.
app_get_status
Answers
Suggested answer: B

Explanation:

The API server is a service that runs on the Security Management Server and enables external applications to communicate with the Check Point management database using REST APIs. You can verify that the API server is responding by using the following command in Expert mode:

This command will display the current status of the API server, such as running, stopped, or initializing. It will also show the API version, port number, and SSL certificate information.

Reference:Check Point R81 REST API Reference Guide

Where you can see and search records of action done by R81 SmartConsole administrators?

A.
In SmartView Tracker, open active log
A.
In SmartView Tracker, open active log
Answers
B.
In the Logs & Monitor view, select ''Open Audit Log View''
B.
In the Logs & Monitor view, select ''Open Audit Log View''
Answers
C.
In SmartAuditLog View
C.
In SmartAuditLog View
Answers
D.
In Smartlog, all logs
D.
In Smartlog, all logs
Answers
Suggested answer: B

Explanation:

The Audit Log is a feature that records all the actions performed by R81 SmartConsole administrators, such as logging in, logging out, publishing, installing policy, creating objects, modifying rules, etc. You can see and search records of action done by R81 SmartConsole administrators by following these steps:

In SmartConsole, go toLogs & Monitorview.

In the left pane, selectOpen Audit Log View.

In the right pane, you will see a table that shows all the audit log records. You can filter, sort, group, or search the records by using the toolbar options.

You can also double-click on a record to see more details in a pop-up window.

Reference:R81 Logging and Monitoring Administration Guide

Fill in the blank: The R81 utility fw monitor is used to troubleshoot ______________________.

A.
User data base corruption
A.
User data base corruption
Answers
B.
LDAP conflicts
B.
LDAP conflicts
Answers
C.
Traffic issues
C.
Traffic issues
Answers
D.
Phase two key negotiations
D.
Phase two key negotiations
Answers
Suggested answer: C

Explanation:

Check Point's FW Monitor is a powerful built-in tool for capturing network traffic at the packet level. The FW Monitor utility captures network packets at multiple capture points along the FireWall inspection chains. These captured packets can be inspected later using the WireShark.

The Firewall kernel is replicated multiple times, therefore:

A.
The Firewall kernel only touches the packet if the connection is accelerated
A.
The Firewall kernel only touches the packet if the connection is accelerated
Answers
B.
The Firewall can run different policies per core
B.
The Firewall can run different policies per core
Answers
C.
The Firewall kernel is replicated only with new connections and deletes itself once the connection times out
C.
The Firewall kernel is replicated only with new connections and deletes itself once the connection times out
Answers
D.
The Firewall can run the same policy on all cores.
D.
The Firewall can run the same policy on all cores.
Answers
Suggested answer: D

Explanation:

On a Security Gateway with CoreXL enabled, the Firewall kernel is replicated multiple times. Each replicated copy, or instance, runs on one processing core. These instances handle traffic concurrently, and each instance is a complete and independent inspection kernel. When CoreXL is enabled, all the kernel instances in the Security Gateway process traffic through the same interfaces and apply the same security policy.

Selecting an event displays its configurable properties in the Detail pane and a description of the event in the Description pane. Which is NOT an option to adjust or configure?

A.
Severity
A.
Severity
Answers
B.
Automatic reactions
B.
Automatic reactions
Answers
C.
Policy
C.
Policy
Answers
D.
Threshold
D.
Threshold
Answers
Suggested answer: C

Explanation:

An event is a notification that something significant has occurred on a Check Point product or network. Events are generated by various sources, such as blades, gateways, servers, SmartEvent, etc. You can view and manage events in SmartConsole by using theEventstab in theLogs & Monitorview. Selecting an event displays its configurable properties in the Detail pane and a description of the event in the Description pane. The configurable properties include:

Severity: The level of importance or urgency of the event. You can change the severity of an event by selecting a different value from the drop-down list.

Automatic reactions: The actions that are triggered when an event occurs. You can add, edit, or delete automatic reactions for an event by clicking on the+icon or the pencil icon.

Threshold: The minimum number or frequency of occurrences of an event that triggers an automatic reaction. You can change the threshold of an event by entering a different value in the text box.

The policy is not an option to adjust or configure for an event. The policy is a set of rules that define how to handle events based on their source, type, severity, etc. You can create and manage policies in SmartEvent by using thePoliciestab in theLogs & Monitorview.

Reference:R81 Logging and Monitoring Administration Guide

To fully enable Dynamic Dispatcher on a Security Gateway:

A.
run fw ctl multik set_mode 9 in Expert mode and then Reboot.
A.
run fw ctl multik set_mode 9 in Expert mode and then Reboot.
Answers
B.
Using cpconfig, update the Dynamic Dispatcher value to ''full'' under the CoreXL menu.
B.
Using cpconfig, update the Dynamic Dispatcher value to ''full'' under the CoreXL menu.
Answers
C.
Edit/proc/interrupts to include multik set_mode 1 at the bottom of the file, save, and reboot.
C.
Edit/proc/interrupts to include multik set_mode 1 at the bottom of the file, save, and reboot.
Answers
D.
run fw multik set_mode 1 in Expert mode and then reboot.
D.
run fw multik set_mode 1 in Expert mode and then reboot.
Answers
Suggested answer: A

Explanation:

To fully enable Dynamic Dispatcher on a Security Gateway, you need to run the following command in Expert mode then reboot:

This command sets the multi-core mode to 9, which means that Dynamic Dispatcher is enabled without Firewall Priority Queues. Dynamic Dispatcher is a feature that optimizes the performance of Security Gateways with multiple CPU cores by dynamically allocating traffic to different cores based on their load and priority. Dynamic Dispatcher can improve the throughput and scalability of the Security Gateway, especially for traffic that is not accelerated by SecureXL. The other commands are not valid or do not enable Dynamic Dispatcher.

Reference:R81 Performance Tuning Administration Guide

Session unique identifiers are passed to the web api using which http header option?

A.
X-chkp-sid
A.
X-chkp-sid
Answers
B.
Accept-Charset
B.
Accept-Charset
Answers
C.
Proxy-Authorization
C.
Proxy-Authorization
Answers
D.
Application
D.
Application
Answers
Suggested answer: A

Explanation:

Session unique identifiers are passed to the web API using theX-chkp-sidHTTP header option. The web API is a service that runs on the Security Management Server and enables external applications to communicate with the Check Point management database using REST APIs. To use the web API, you need to create a session with the management server by sending a login request with your credentials. The management server will respond with a session unique identifier (SID) that represents your session. You need to pass this SID in every subsequent request to the web API using the X-chkp-sid HTTP header option. This way, the management server can identify and authenticate your session and perform the requested operations.

Reference:Check Point R81 REST API Reference Guide

Total 626 questions
Go to page: of 63