ExamGecko
Home / Checkpoint / 156-315.81 / List of questions
Ask Question

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 11

Add to Whishlist

List of questions

Question 101

Report Export Collapse

Which command can you use to verify the number of active concurrent connections?

fw conn all
fw conn all
fw ctl pstat
fw ctl pstat
show all connections
show all connections
show connections
show connections
Suggested answer: B
Explanation:

The commandfw ctl pstatcan be used to verify the number of active concurrent connections on a gateway. This command displays various statistics about the firewall kernel, such as memory usage, CPU utilization, packet rates, and connection table information. The output of this command includes a line that shows the current number of connections and the peak number of connections since the last reboot. For example:

Checkpoint 156-315.81 image Question 101 explanation 11509 09162024015605000000

This means that there are currently 1234 active connections out of a maximum of 8192 connections, which is 15% of the connection table capacity. The peak number of connections since the last reboot was 2345.

asked 16/09/2024
justen layne
44 questions

Question 102

Report Export Collapse

Which of the following statements is TRUE about R81 management plug-ins?

The plug-in is a package installed on the Security Gateway.
The plug-in is a package installed on the Security Gateway.
Installing a management plug-in requires a Snapshot, just like any upgrade process.
Installing a management plug-in requires a Snapshot, just like any upgrade process.
A management plug-in interacts with a Security Management Server to provide new features and support for new products.
A management plug-in interacts with a Security Management Server to provide new features and support for new products.
Using a plug-in offers full central management only if special licensing is applied to specific features of the plug-in.
Using a plug-in offers full central management only if special licensing is applied to specific features of the plug-in.
Suggested answer: C
Explanation:

A management plug-in is a software component that interacts with a Security Management Server to provide new features and support for new products. A management plug-in can extend the functionality of SmartConsole, SmartDashboard, SmartView Monitor, SmartView Tracker, SmartEvent, SmartReporter, SmartProvisioning, SmartUpdate, and other management tools. A management plug-in can also add new objects, policies, rules, actions, reports, views, and wizards to the management system. Some examples of management plug-ins are CloudGuard Controller, SandBlast Agent, Endpoint Security Server, Threat Extraction for Web, etc.

asked 16/09/2024
Hiren Patel
41 questions

Question 103

Report Export Collapse

How can SmartView application accessed?

http://<Security Management IP Address>/smartview
http://<Security Management IP Address>/smartview
http://<Security Management IP Address>:4434/smartview/
http://<Security Management IP Address>:4434/smartview/
https://<Security Management IP Address>/smartview/
https://<Security Management IP Address>/smartview/
https://<Security Management host name>:4434/smartview/
https://<Security Management host name>:4434/smartview/
Suggested answer: C
Explanation:

SmartView is a web-based application that allows you to view and analyze logs, reports, and events from multiple Check Point products. You can access SmartView by using the following URL:

Checkpoint 156-315.81 image Question 103 explanation 11511 09162024015605000000

You need to use HTTPS protocol and the default port 443. You also need to enter the IP address of the Security Management Server that hosts the SmartView application. You cannot use the host name of the Security Management Server or a different port number.

Reference:SmartView R81 Administration Guide

asked 16/09/2024
Hans Walter Katzengruber
29 questions

Question 104

Report Export Collapse

What command verifies that the API server is responding?

api stat
api stat
api status
api status
show api_status
show api_status
app_get_status
app_get_status
Suggested answer: B
Explanation:

The API server is a service that runs on the Security Management Server and enables external applications to communicate with the Check Point management database using REST APIs. You can verify that the API server is responding by using the following command in Expert mode:

Checkpoint 156-315.81 image Question 104 explanation 11512 09162024015605000000

This command will display the current status of the API server, such as running, stopped, or initializing. It will also show the API version, port number, and SSL certificate information.

Reference:Check Point R81 REST API Reference Guide

asked 16/09/2024
Martine Cornax
41 questions

Question 105

Report Export Collapse

Where you can see and search records of action done by R81 SmartConsole administrators?

In SmartView Tracker, open active log
In SmartView Tracker, open active log
In the Logs & Monitor view, select ''Open Audit Log View''
In the Logs & Monitor view, select ''Open Audit Log View''
In SmartAuditLog View
In SmartAuditLog View
In Smartlog, all logs
In Smartlog, all logs
Suggested answer: B
Explanation:

The Audit Log is a feature that records all the actions performed by R81 SmartConsole administrators, such as logging in, logging out, publishing, installing policy, creating objects, modifying rules, etc. You can see and search records of action done by R81 SmartConsole administrators by following these steps:

In SmartConsole, go toLogs & Monitorview.

In the left pane, selectOpen Audit Log View.

In the right pane, you will see a table that shows all the audit log records. You can filter, sort, group, or search the records by using the toolbar options.

You can also double-click on a record to see more details in a pop-up window.

Reference:R81 Logging and Monitoring Administration Guide

asked 16/09/2024
CATALIN FLORESCU
39 questions

Question 106

Report Export Collapse

Fill in the blank: The R81 utility fw monitor is used to troubleshoot ______________________.

User data base corruption
User data base corruption
LDAP conflicts
LDAP conflicts
Traffic issues
Traffic issues
Phase two key negotiations
Phase two key negotiations
Suggested answer: C
Explanation:

Check Point's FW Monitor is a powerful built-in tool for capturing network traffic at the packet level. The FW Monitor utility captures network packets at multiple capture points along the FireWall inspection chains. These captured packets can be inspected later using the WireShark.

asked 16/09/2024
Madhankumar Rathinakumar
42 questions

Question 107

Report Export Collapse

The Firewall kernel is replicated multiple times, therefore:

The Firewall kernel only touches the packet if the connection is accelerated
The Firewall kernel only touches the packet if the connection is accelerated
The Firewall can run different policies per core
The Firewall can run different policies per core
The Firewall kernel is replicated only with new connections and deletes itself once the connection times out
The Firewall kernel is replicated only with new connections and deletes itself once the connection times out
The Firewall can run the same policy on all cores.
The Firewall can run the same policy on all cores.
Suggested answer: D
Explanation:

On a Security Gateway with CoreXL enabled, the Firewall kernel is replicated multiple times. Each replicated copy, or instance, runs on one processing core. These instances handle traffic concurrently, and each instance is a complete and independent inspection kernel. When CoreXL is enabled, all the kernel instances in the Security Gateway process traffic through the same interfaces and apply the same security policy.

asked 16/09/2024
Fatmata Kabba
58 questions

Question 108

Report Export Collapse

Selecting an event displays its configurable properties in the Detail pane and a description of the event in the Description pane. Which is NOT an option to adjust or configure?

Severity
Severity
Automatic reactions
Automatic reactions
Policy
Policy
Threshold
Threshold
Suggested answer: C
Explanation:

An event is a notification that something significant has occurred on a Check Point product or network. Events are generated by various sources, such as blades, gateways, servers, SmartEvent, etc. You can view and manage events in SmartConsole by using theEventstab in theLogs & Monitorview. Selecting an event displays its configurable properties in the Detail pane and a description of the event in the Description pane. The configurable properties include:

Severity: The level of importance or urgency of the event. You can change the severity of an event by selecting a different value from the drop-down list.

Automatic reactions: The actions that are triggered when an event occurs. You can add, edit, or delete automatic reactions for an event by clicking on the+icon or the pencil icon.

Threshold: The minimum number or frequency of occurrences of an event that triggers an automatic reaction. You can change the threshold of an event by entering a different value in the text box.

The policy is not an option to adjust or configure for an event. The policy is a set of rules that define how to handle events based on their source, type, severity, etc. You can create and manage policies in SmartEvent by using thePoliciestab in theLogs & Monitorview.

Reference:R81 Logging and Monitoring Administration Guide

asked 16/09/2024
Alper Atar
48 questions

Question 109

Report Export Collapse

To fully enable Dynamic Dispatcher on a Security Gateway:

run fw ctl multik set_mode 9 in Expert mode and then Reboot.
run fw ctl multik set_mode 9 in Expert mode and then Reboot.
Using cpconfig, update the Dynamic Dispatcher value to ''full'' under the CoreXL menu.
Using cpconfig, update the Dynamic Dispatcher value to ''full'' under the CoreXL menu.
Edit/proc/interrupts to include multik set_mode 1 at the bottom of the file, save, and reboot.
Edit/proc/interrupts to include multik set_mode 1 at the bottom of the file, save, and reboot.
run fw multik set_mode 1 in Expert mode and then reboot.
run fw multik set_mode 1 in Expert mode and then reboot.
Suggested answer: A
Explanation:

To fully enable Dynamic Dispatcher on a Security Gateway, you need to run the following command in Expert mode then reboot:

Checkpoint 156-315.81 image Question 109 explanation 11517 09162024015605000000

This command sets the multi-core mode to 9, which means that Dynamic Dispatcher is enabled without Firewall Priority Queues. Dynamic Dispatcher is a feature that optimizes the performance of Security Gateways with multiple CPU cores by dynamically allocating traffic to different cores based on their load and priority. Dynamic Dispatcher can improve the throughput and scalability of the Security Gateway, especially for traffic that is not accelerated by SecureXL. The other commands are not valid or do not enable Dynamic Dispatcher.

Reference:R81 Performance Tuning Administration Guide

asked 16/09/2024
Mk Cheng
50 questions

Question 110

Report Export Collapse

Session unique identifiers are passed to the web api using which http header option?

X-chkp-sid
X-chkp-sid
Accept-Charset
Accept-Charset
Proxy-Authorization
Proxy-Authorization
Application
Application
Suggested answer: A
Explanation:

Session unique identifiers are passed to the web API using theX-chkp-sidHTTP header option. The web API is a service that runs on the Security Management Server and enables external applications to communicate with the Check Point management database using REST APIs. To use the web API, you need to create a session with the management server by sending a login request with your credentials. The management server will respond with a session unique identifier (SID) that represents your session. You need to pass this SID in every subsequent request to the web API using the X-chkp-sid HTTP header option. This way, the management server can identify and authenticate your session and perform the requested operations.

Reference:Check Point R81 REST API Reference Guide

asked 16/09/2024
Arthur Moron
33 questions
Total 626 questions
Go to page: of 63