ExamGecko
Home Home / Checkpoint / 156-315.81

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 15

Question list
Search
Search

Fill in the blank: The ''fw monitor'' tool can be best used to troubleshoot ____________________.

A.
AV issues
A.
AV issues
Answers
B.
VPN errors
B.
VPN errors
Answers
C.
Network traffic issues
C.
Network traffic issues
Answers
D.
Authentication issues
D.
Authentication issues
Answers
Suggested answer: C

Explanation:

The ''fw monitor'' tool can be best used to troubleshootnetwork traffic issues. Fw monitor is a tool that allows administrators to capture packets at different inspection points in the Firewall kernel, and apply filters and flags to analyze the traffic. Fw monitor can help troubleshoot network connectivity problems, packet drops, NAT issues, VPN issues, and more. The other options are either not related or less suitable for fw monitor.

For Management High Availability, which of the following is NOT a valid synchronization status?

A.
Collision
A.
Collision
Answers
B.
Down
B.
Down
Answers
C.
Lagging
C.
Lagging
Answers
D.
Never been synchronized
D.
Never been synchronized
Answers
Suggested answer: B

Explanation:

For Management High Availability, the valid synchronization status options are:

A) Collision

B) Down

C) Lagging

D) Never been synchronized

In this context, 'Down' indicates that the synchronization is not functioning correctly or that the standby management server is not reachable. This is a valid synchronization status, so the answer is not B.

Can multiple administrators connect to a Security Management Server at the same time?

A.
No, only one can be connected
A.
No, only one can be connected
Answers
B.
Yes, all administrators can modify a network object at the same time
B.
Yes, all administrators can modify a network object at the same time
Answers
C.
Yes, every administrator has their own username, and works in a session that is independent of other administrators.
C.
Yes, every administrator has their own username, and works in a session that is independent of other administrators.
Answers
D.
Yes, but only one has the right to write.
D.
Yes, but only one has the right to write.
Answers
Suggested answer: C

Explanation:

Multiple administrators can connect to a Security Management Server at the same time. Each administrator has their own username and works in a session that is independent of other administrators. This allows for collaboration and simultaneous management tasks by different administrators.

Which process is available on any management product and on products that require direct GUI access, such as SmartEvent and provides GUI client communications, database manipulation, policy compilation and Management HA synchronization?

A.
cpwd
A.
cpwd
Answers
B.
fwd
B.
fwd
Answers
C.
cpd
C.
cpd
Answers
D.
fwm
D.
fwm
Answers
Suggested answer: D

Explanation:

Firewall Management (fwm) is available on any management product, including Multi-Domain and on products that requite direct GUI access, such as SmartEvent, It provides the following:

-- GUI Client communication

-- Database manipulation

-- Policy Compilation

-- Management HA sync

To add a file to the Threat Prevention Whitelist, what two items are needed?

A.
File name and Gateway
A.
File name and Gateway
Answers
B.
Object Name and MD5 signature
B.
Object Name and MD5 signature
Answers
C.
MD5 signature and Gateway
C.
MD5 signature and Gateway
Answers
D.
IP address of Management Server and Gateway
D.
IP address of Management Server and Gateway
Answers
Suggested answer: B

Explanation:

To add a file to the Threat Prevention Whitelist, you need two items:

B) Object Name and MD5 signature

You need the Object Name to identify the file or object you want to whitelist, and the MD5 signature to specify the unique hash value of that file. The MD5 signature ensures that the specific file you want to whitelist is identified accurately.

Under which file is the proxy arp configuration stored?

A.
$FWDIR/state/proxy_arp.conf on the management server
A.
$FWDIR/state/proxy_arp.conf on the management server
Answers
B.
$FWDIR/conf/local.arp on the management server
B.
$FWDIR/conf/local.arp on the management server
Answers
C.
$FWDIR/state/_tmp/proxy.arp on the security gateway
C.
$FWDIR/state/_tmp/proxy.arp on the security gateway
Answers
D.
$FWDIR/conf/local.arp on the gateway
D.
$FWDIR/conf/local.arp on the gateway
Answers
Suggested answer: D

Explanation:

The proxy ARP configuration is stored under the following file: $FWDIR/conf/local.arp on the gateway This file, local.arp, contains the proxy ARP configuration for the Security Gateway. It is used to configure ARP (Address Resolution Protocol) settings for network communication.

What information is NOT collected from a Security Gateway in a Cpinfo?

A.
Firewall logs
A.
Firewall logs
Answers
B.
Configuration and database files
B.
Configuration and database files
Answers
C.
System message logs
C.
System message logs
Answers
D.
OS and network statistics
D.
OS and network statistics
Answers
Suggested answer: A

Explanation:

In a Cpinfo (Checkpoint information) command, various information is collected from a Security Gateway. However, firewall logs are NOT collected from a Security Gateway in a Cpinfo.

A) Firewall logs

The Cpinfo command typically collects information such as configuration and database files, system message logs, OS and network statistics, but it does not include firewall logs. Firewall logs are usually obtained separately using other methods or tools.

SandBlast appliances can be deployed in the following modes:

A.
using a SPAN port to receive a copy of the traffic only
A.
using a SPAN port to receive a copy of the traffic only
Answers
B.
detect only
B.
detect only
Answers
C.
inline/prevent or detect
C.
inline/prevent or detect
Answers
D.
as a Mail Transfer Agent and as part of the traffic flow only
D.
as a Mail Transfer Agent and as part of the traffic flow only
Answers
Suggested answer: C

Explanation:

SandBlast appliances can be deployed in the following modes:

C) Inline/prevent or detect

SandBlast appliances can be deployed in an inline mode where they actively inspect and prevent or detect malicious traffic. In this mode, the appliance sits in the network traffic path and can take actions to block or detect threats in real-time.

Traffic from source 192.168.1.1 is going to www.google.com. The Application Control Blade on the gateway is inspecting the traffic. Assuming acceleration is enabled which path is handling the traffic?

A.
Slow Path
A.
Slow Path
Answers
B.
Medium Path
B.
Medium Path
Answers
C.
Fast Path
C.
Fast Path
Answers
D.
Accelerated Path
D.
Accelerated Path
Answers
Suggested answer: A

Explanation:

When traffic from source 192.168.1.1 is going to www.google.com, and the Application Control Blade on the gateway is inspecting the traffic with acceleration enabled, it is handled by the Slow Path.

A) Slow Path

The Slow Path is responsible for handling traffic that requires full inspection by various security blades, including the Application Control Blade. Acceleration may offload some processing to the Medium Path or Fast Path, but the Slow Path is still involved in deeper inspection.

How do you enable virtual mac (VMAC) on-the-fly on a cluster member?

A.
cphaprob set int fwha_vmac_global_param_enabled 1
A.
cphaprob set int fwha_vmac_global_param_enabled 1
Answers
B.
clusterXL set int fwha_vmac_global_param_enabled 1
B.
clusterXL set int fwha_vmac_global_param_enabled 1
Answers
C.
fw ctl set int fwha_vmac_global_param_enabled 1
C.
fw ctl set int fwha_vmac_global_param_enabled 1
Answers
D.
cphaconf set int fwha_vmac_global_param_enabled 1
D.
cphaconf set int fwha_vmac_global_param_enabled 1
Answers
Suggested answer: C

Explanation:

To enable VMAC mode on a cluster member, you need to set the value of the global kernel parameterfwha_vmac_global_param_enabledto 1. This can be done on-the-fly using the commandfw ctl set int fwha_vmac_global_param_enabled 1on all cluster members. This command does not require a reboot or a policy installation. VMAC mode allows the cluster to use a virtual MAC address for its virtual IP addresses, which reduces the number of gratuitous ARP packets sent upon failover and avoids ARP cache issues on some routers and switches.

Reference:How to enable ClusterXL Virtual MAC (VMAC) mode

Total 626 questions
Go to page: of 63