Checkpoint 156-315.81 Practice Test - Questions Answers, Page 12

List of questions
Question 111

Which command shows actual allowed connections in state table?
The correct command to show actual allowed connections in the state table is option B: fw tab --t connections. This command displays the contents of the 'connections' table, which contains information about the active connections being tracked by the firewall.
Option A (fw tab --t StateTable) is incorrect as there is no 'StateTable' table; it should be 'connections.'
Option C (fw tab --t connection) is also incorrect, as it should be 'connections.'
Option D (fw tab connections) is not the correct syntax for the command.
Question 112

What SmartEvent component creates events?
The SmartEvent component that creates events is the Correlation Unit, which is responsible for correlating and analyzing security events to identify patterns and potential threats.
Option A, 'Consolidation Policy,' does not create events but is used to configure policies for event consolidation.
Option C, 'SmartEvent Policy,' is not responsible for creating events but is used to configure policies related to SmartEvent.
Option D, 'SmartEvent GUI,' is the graphical user interface for managing SmartEvent but does not create events itself.
Question 113

Which command collects diagnostic data for analyzing customer setup remotely?
CPInfo is an auto-updatable utility that collects diagnostics data on a customer's machine at the time of execution and uploads it to Check Point servers (it replaces the standalone cp_uploader utility for uploading files to Check Point servers).
The CPInfo output file allows analyzing customer setups from a remote location. Check Point support engineers can open the CPInfo file in a demo mode, while viewing actual customer Security Policies and Objects. This allows the in-depth analysis of customer's configuration and environment settings.
Question 114

Which features are only supported with R81.20 Gateways but not R77.x?
The features that are only supported with R81.20 Gateways and not with R77.x are described in option C:
'C. The rule base can be built of layers, each containing a set of the security rules. Layers are inspected in the order in which they are defined, allowing control over the rule base flow and which security functionalities take precedence.'
This feature, known as Rule Base Layers, allows for greater flexibility and control in organizing and prioritizing security rules within the rule base.
Options A, B, and D do not specifically pertain to features introduced in R81.20 and are available in earlier versions as well.
Question 115

Which CLI command will reset the IPS pattern matcher statistics?
The CLI command to reset the IPS (Intrusion Prevention System) pattern matcher statistics is option D: ips pmstats reset. This command will reset the statistics related to the IPS pattern matcher.
Options A, B, and C are not the correct syntax for resetting the IPS pattern matcher statistics.
Question 116

When requiring certificates for mobile devices, make sure the authentication method is set to one of the following, Username and Password, RADIUS or ________.
When requiring certificates for mobile devices, the authentication method should be set to one of the following:
Username and Password
RADIUS
SecurID (RSA SecurID)
So, the correct answer is option B, 'SecurID.'
Options A, C, and D are not standard authentication methods for mobile devices in this context.
Question 117

Check Point recommends configuring Disk Space Management parameters to delete old log entries when available disk space is less than or equal to?
Check Point recommends configuring Disk Space Management parameters to delete old log entries when available disk space is less than or equal to a certain threshold. In this case, the correct threshold is specified as option D: 15%.
So, when the available disk space reaches or falls below 15%, old log entries should be deleted to free up space.
Options A, B, and C do not represent the recommended threshold for deleting old log entries according to Check Point's best practices.
Topic 2, Exam Pool B
Question 118

SmartEvent has several components that function together to track security threats. What is the function of the Correlation Unit as a component of this architecture?
The Correlation Unit in SmartEvent architecture has the function of analyzing each log entry as it arrives at the log server according to the Event Policy. When it identifies a threat pattern, it forwards an event to the SmartEvent Server. This is an essential function in threat detection and analysis, as it helps in identifying and alerting about security threats based on the configured policies.
Option A correctly describes the function of the Correlation Unit, making it the verified answer.
Question 119

SecureXL improves non-encrypted firewall traffic throughput and encrypted VPN traffic throughput.
SecureXL is a performance-enhancing technology used in Check Point firewalls. It improves the throughput of both non-encrypted firewall traffic and encrypted VPN traffic. The statement in option C is true because SecureXL does improve both types of traffic by offloading processing to dedicated hardware acceleration, optimizing firewall and VPN operations.
Option C correctly states that SecureXL improves this traffic, making it the verified answer.
Question 120

Which command gives us a perspective of the number of kernel tables?
The command 'fw tab -s' is used to display information about the state of various kernel tables in a Check Point firewall. It provides a perspective on the number and status of these tables, which can be helpful for troubleshooting and monitoring firewall performance.
Option B correctly identifies the command that gives a perspective of the number of kernel tables, making it the verified answer.
Question