ExamGecko
Home Home / Checkpoint / 156-315.81

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 14

Question list
Search
Search

Where do you create and modify the Mobile Access policy in R81?

A.
SmartConsole
A.
SmartConsole
Answers
B.
SmartMonitor
B.
SmartMonitor
Answers
C.
SmartEndpoint
C.
SmartEndpoint
Answers
D.
SmartDashboard
D.
SmartDashboard
Answers
Suggested answer: A

Explanation:

In R81, the Mobile Access policy is created and modified in SmartConsole. SmartConsole is the management interface for configuring and managing various security policies, including Mobile Access policies.

SmartConsole R81 requires the following ports to be open for SmartEvent R81 management:

A.
19090,22
A.
19090,22
Answers
B.
19190,22
B.
19190,22
Answers
C.
18190,80
C.
18190,80
Answers
D.
19009,443
D.
19009,443
Answers
Suggested answer: D

Explanation:

To use SmartConsole R81 for managing SmartEvent R81, you need to have the following ports open:

Port 19009 for communication over HTTPS (443)

Port 19009 for communication over HTTP (80)

These ports are necessary for the SmartConsole to communicate with SmartEvent for management and monitoring purposes.

Which configuration file contains the structure of the Security Server showing the port numbers, corresponding protocol name, and status?

A.
$FWDIR/database/fwauthd.conf
A.
$FWDIR/database/fwauthd.conf
Answers
B.
$FWDIR/conf/fwauth.conf
B.
$FWDIR/conf/fwauth.conf
Answers
C.
$FWDIR/conf/fwauthd.conf
C.
$FWDIR/conf/fwauthd.conf
Answers
D.
$FWDIR/state/fwauthd.conf
D.
$FWDIR/state/fwauthd.conf
Answers
Suggested answer: C

Explanation:

The configuration file that contains the structure of the Security Server showing the port numbers, corresponding protocol name, and status is $FWDIR/conf/fwauthd.conf. This file is used for configuring authentication services in Check Point Security Servers.

What API command below creates a new host with the name ''New Host'' and IP address of ''192.168.0.10''?

A.
new host name ''New Host'' ip-address ''192.168.0.10''
A.
new host name ''New Host'' ip-address ''192.168.0.10''
Answers
B.
set host name ''New Host'' ip-address ''192.168.0.10''
B.
set host name ''New Host'' ip-address ''192.168.0.10''
Answers
C.
create host name ''New Host'' ip-address ''192.168.0.10''
C.
create host name ''New Host'' ip-address ''192.168.0.10''
Answers
D.
add host name ''New Host'' ip-address ''192.168.0.10''
D.
add host name ''New Host'' ip-address ''192.168.0.10''
Answers
Suggested answer: D

Explanation:

The API command to create a new host with the name 'New Host' and IP address '192.168.0.10' is:

This command adds a host object with the specified name and IP address to the Check Point configuration.

Which command is used to display status information for various components?

A.
show all systems
A.
show all systems
Answers
B.
show system messages
B.
show system messages
Answers
C.
sysmess all
C.
sysmess all
Answers
D.
show sysenv all
D.
show sysenv all
Answers
Suggested answer: D

Explanation:

The command used to display status information for various components is show sysenv all. This command provides comprehensive status information about the system's environment and various components, including hardware and software components. It can be useful for troubleshooting and monitoring the system's health.

What are the blades of Threat Prevention?

A.
IPS, DLP, AntiVirus, AntiBot, Sandblast Threat Emulation/Extraction
A.
IPS, DLP, AntiVirus, AntiBot, Sandblast Threat Emulation/Extraction
Answers
B.
DLP, AntiVirus, QoS, AntiBot, Sandblast Threat Emulation/Extraction
B.
DLP, AntiVirus, QoS, AntiBot, Sandblast Threat Emulation/Extraction
Answers
C.
IPS, AntiVirus, AntiBot
C.
IPS, AntiVirus, AntiBot
Answers
D.
IPS, AntiVirus, AntiBot, Sandblast Threat Emulation/Extraction
D.
IPS, AntiVirus, AntiBot, Sandblast Threat Emulation/Extraction
Answers
Suggested answer: D

Explanation:

The blades of Threat Prevention in Check Point include:

Intrusion Prevention System (IPS)

AntiVirus

AntiBot

SandBlast Threat Emulation/Extraction

So, the correct answer is D, which includes all the mentioned blades.

The essential means by which state synchronization works to provide failover in the event an active member goes down, ____________ is used specifically for clustered environments to allow gateways to report their own state and learn about the states of other members in the cluster.

A.
ccp
A.
ccp
Answers
B.
cphaconf
B.
cphaconf
Answers
C.
cphad
C.
cphad
Answers
D.
cphastart
D.
cphastart
Answers
Suggested answer: A

Explanation:

The essential means by which state synchronization works to provide failover in the event an active member goes down,ccpis used specifically for clustered environments to allow gateways to report their own state and learn about the states of other members in the cluster. Ccp stands for Cluster Control Protocol, and it is a proprietary protocol that runs on UDP port 8116. Ccp is responsible for exchanging state information, health checks, load balancing decisions, and synchronization network configuration between cluster members.The other options are either commands or daemons that are related to cluster operations, but not the protocol itself.

Which statement is most correct regarding about ''CoreXL Dynamic Dispatcher''?

A.
The CoreXL FW instanxces assignment mechanism is based on Source MAC addresses, Destination MAC addresses
A.
The CoreXL FW instanxces assignment mechanism is based on Source MAC addresses, Destination MAC addresses
Answers
B.
The CoreXL FW instances assignment mechanism is based on the utilization of CPU cores
B.
The CoreXL FW instances assignment mechanism is based on the utilization of CPU cores
Answers
C.
The CoreXL FW instances assignment mechanism is based on IP Protocol type
C.
The CoreXL FW instances assignment mechanism is based on IP Protocol type
Answers
D.
The CoreXl FW instances assignment mechanism is based on Source IP addresses, Destination IP addresses, and the IP 'Protocol' type
D.
The CoreXl FW instances assignment mechanism is based on Source IP addresses, Destination IP addresses, and the IP 'Protocol' type
Answers
Suggested answer: B

Explanation:

The statement that is most correct regarding about ''CoreXL Dynamic Dispatcher'' is: The CoreXL FW instances assignment mechanism is based on the utilization of CPU cores. CoreXL Dynamic Dispatcher is a feature that allows the Security Gateway to dynamically assign connections to the most available CoreXL FW instance, based on the CPU core utilization. This improves the performance and load balancing of the Security Gateway, especially when handling connections with different processing requirements.The other statements are either incorrect or describe the CoreXL Static Dispatcher mechanism, which assigns connections based on a hash function of the Source IP, Destination IP, and IP Protocol type.

What CLI command compiles and installs a Security Policy on the target's Security Gateways?

A.
fwm compile
A.
fwm compile
Answers
B.
fwm load
B.
fwm load
Answers
C.
fwm fetch
C.
fwm fetch
Answers
D.
fwm install
D.
fwm install
Answers
Suggested answer: B

Explanation:

The CLI command that compiles and installs a Security Policy on the target's Security Gateways isfwm load. Fwm stands for FireWall Management, and it is a command that allows administrators to perform various management tasks on the Security Management Server or Multi-Domain Server. Fwm load takes two arguments: the name of the Security Policy and the name or IP address of the target Security Gateway or Gateway Cluster. For example:

[Expert@SMS]# fwm load Standard_Policy fw1

This command will compile and install the Standard_Policy on the Security Gateway named fw1. The other commands are either invalid or perform different functions.

Pamela is Cyber Security Engineer working for Global Instance Firm with large scale deployment of Check Point Enterprise Appliances using GAiA/R81.20. Company's Developer Team is having random access issue to newly deployed Application Server in DMZ's Application Server Farm Tier and blames DMZ Security Gateway as root cause. The ticket has been created and issue is at Pamela's desk for an investigation. Pamela decides to use Check Point's Packet Analyzer Tool-fw monitor to iron out the issue during approved Maintenance window.

What do you recommend as the best suggestion for Pamela to make sure she successfully captures entire traffic in context of Firewall and problematic traffic?

A.
Pamela should check SecureXL status on DMZ Security gateway and if it's turned ON. She should turn OFF SecureXL before using fw monitor to avoid misleading traffic captures.
A.
Pamela should check SecureXL status on DMZ Security gateway and if it's turned ON. She should turn OFF SecureXL before using fw monitor to avoid misleading traffic captures.
Answers
B.
Pamela should check SecureXL status on DMZ Security Gateway and if it's turned OFF. She should turn ON SecureXL before using fw monitor to avoid misleading traffic captures.
B.
Pamela should check SecureXL status on DMZ Security Gateway and if it's turned OFF. She should turn ON SecureXL before using fw monitor to avoid misleading traffic captures.
Answers
C.
Pamela should use tcpdump over fw monitor tool as tcpdump works at OS-level and captures entire traffic.
C.
Pamela should use tcpdump over fw monitor tool as tcpdump works at OS-level and captures entire traffic.
Answers
D.
Pamela should use snoop over fw monitor tool as snoop works at NIC driver level and captures entire traffic.
D.
Pamela should use snoop over fw monitor tool as snoop works at NIC driver level and captures entire traffic.
Answers
Suggested answer: A

Explanation:

The best suggestion for Pamela to make sure she successfully captures entire traffic in context of Firewall and problematic traffic is: Pamela should check SecureXL status on DMZ Security gateway and if it's turned ON. She should turn OFF SecureXL before using fw monitor to avoid misleading traffic captures. SecureXL is a technology that accelerates network traffic processing by offloading intensive operations from the Firewall kernel to a dedicated SecureXL device. However, this also means that some traffic might not be seen by fw monitor, which is a tool that captures packets at different inspection points in the Firewall kernel. Therefore, to ensure that fw monitor captures all traffic, SecureXL should be turned OFF before using fw monitor. The other suggestions are either incorrect or less effective in capturing traffic.

Total 626 questions
Go to page: of 63