ExamGecko
Home Home / Checkpoint / 156-315.81

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 18

Question list
Search
Search

Which one of the following is true about Capsule Connect?

A.
It is a full layer 3 VPN client
A.
It is a full layer 3 VPN client
Answers
B.
It offers full enterprise mobility management
B.
It offers full enterprise mobility management
Answers
C.
It is supported only on iOS phones and Windows PCs
C.
It is supported only on iOS phones and Windows PCs
Answers
D.
It does not support all VPN authentication methods
D.
It does not support all VPN authentication methods
Answers
Suggested answer: A

Explanation:

Capsule Connect is a full layer 3 VPN client that provides secure and seamless remote access to corporate networks from iOS and Android devices. It supports all VPN authentication methods, such as certificates, passwords, tokens, and challenge-response. It also supports split tunneling and seamless roaming.

Reference:Capsule Connect Datasheet,Capsule Connect Administration Guide

How often does Threat Emulation download packages by default?

A.
Once a week
A.
Once a week
Answers
B.
Once an hour
B.
Once an hour
Answers
C.
Twice per day
C.
Twice per day
Answers
D.
Once per day
D.
Once per day
Answers
Suggested answer: D

Explanation:

Threat Emulation downloads packages by default once per day. The packages contain updates for the Threat Emulation engine, signatures, and images. The download frequency can be changed in the Threat Prevention policy settings.

Reference:Threat Emulation Administration Guide,Threat Prevention R81 Release Notes

You are investigating issues with to gateway cluster members are not able to establish the first initial cluster synchronization. What service is used by the FWD daemon to do a Full Synchronization?

A.
TCP port 443
A.
TCP port 443
Answers
B.
TCP port 257
B.
TCP port 257
Answers
C.
TCP port 256
C.
TCP port 256
Answers
D.
UDP port 8116
D.
UDP port 8116
Answers
Suggested answer: C

Explanation:

The FWD daemon uses TCP port 256 to do a Full Synchronization between gateway cluster members. This port is also used for other synchronization types, such as Delta Synchronization and Accelerated Synchronization. The FWD daemon is responsible for synchronizing the connections table, NAT table, and VPN keys between cluster members.

Reference: ClusterXL Administration Guide, SK25977 - Ports Used by Check Point Software

Which statement is true about ClusterXL?

A.
Supports Dynamic Routing (Unicast and Multicast)
A.
Supports Dynamic Routing (Unicast and Multicast)
Answers
B.
Supports Dynamic Routing (Unicast Only)
B.
Supports Dynamic Routing (Unicast Only)
Answers
C.
Supports Dynamic Routing (Multicast Only)
C.
Supports Dynamic Routing (Multicast Only)
Answers
D.
Does not support Dynamic Routing
D.
Does not support Dynamic Routing
Answers
Suggested answer: A

Explanation:

ClusterXL supports Dynamic Routing for both Unicast and Multicast traffic. Dynamic Routing protocols, such as OSPF, BGP, or PIM, can be configured on cluster members to exchange routing information with other routers. ClusterXL supports two modes of operation for Dynamic Routing: New Mode and Legacy Mode.

Reference: ClusterXL Administration Guide, SK98226 - ClusterXL New Mode Overview

Which command shows detailed information about VPN tunnels?

A.
cat $FWDIR/conf/vpn.conf
A.
cat $FWDIR/conf/vpn.conf
Answers
B.
vpn tu tlist
B.
vpn tu tlist
Answers
C.
vpn tu
C.
vpn tu
Answers
D.
cpview
D.
cpview
Answers
Suggested answer: B

Explanation:

The command vpn tu tlist shows detailed information about VPN tunnels, such as the peer IP address, encryption domain, IKE phase 1 and phase 2 status, encryption algorithm, and tunnel uptime. The command vpn tu is an interactive tool that allows users to list, delete, or reconnect VPN tunnels. The command cpview is a real-time performance monitoring tool that shows various statistics about the system and network.

Reference: VPN Administration Guide, SK97638 - What is cpview Utility and How to Use it

Which Check Point software blades could be enforced under Threat Prevention profile using Check Point R81.20 SmartConsole application?

A.
IPS, Anti-Bot, URL Filtering, Application Control, Threat Emulation.
A.
IPS, Anti-Bot, URL Filtering, Application Control, Threat Emulation.
Answers
B.
Firewall, IPS, Threat Emulation, Application Control.
B.
Firewall, IPS, Threat Emulation, Application Control.
Answers
C.
IPS, Anti-Bot, Anti-Virus, Threat Emulation, Threat Extraction.
C.
IPS, Anti-Bot, Anti-Virus, Threat Emulation, Threat Extraction.
Answers
D.
Firewall, IPS, Anti-Bot, Anti-Virus, Threat Emulation.
D.
Firewall, IPS, Anti-Bot, Anti-Virus, Threat Emulation.
Answers
Suggested answer: C

Explanation:

The Threat Prevention profile in Check Point R81.20 SmartConsole application allows you to enforce the following software blades: IPS, Anti-Bot, Anti-Virus, Threat Emulation, and Threat Extraction. These software blades provide comprehensive protection against various types of threats, such as network attacks, malware, ransomware, phishing, and zero-day exploits. You can configure the profile settings for each software blade, such as the action to take, the protection scope, and the exceptions.

Reference:Check Point Security Expert R81 Course,Threat Prevention Administration Guide

When gathering information about a gateway using CPINFO, what information is included or excluded when using the ''-x'' parameter?

A.
Includes the registry
A.
Includes the registry
Answers
B.
Gets information about the specified Virtual System
B.
Gets information about the specified Virtual System
Answers
C.
Does not resolve network addresses
C.
Does not resolve network addresses
Answers
D.
Output excludes connection table
D.
Output excludes connection table
Answers
Suggested answer: B

Explanation:

The cpinfo command is a tool that collects diagnostic data from a Check Point gateway or management server. The data includes configuration files, logs, status reports, and more. The cpinfo output can be used for troubleshooting or sent to Check Point support for analysis. The -x parameter is used to get information about the specified Virtual System on a VSX gateway. A Virtual System is a virtualized firewall instance that runs on a VSX gateway and has its own security policy and objects.

Reference:Check Point Security Expert R81 Course,cpinfo Utility,VSX Administration Guide

What component of R81 Management is used for indexing?

A.
DBSync
A.
DBSync
Answers
B.
API Server
B.
API Server
Answers
C.
fwm
C.
fwm
Answers
D.
SOLR
D.
SOLR
Answers
Suggested answer: D

Explanation:

The component of R81 Management that is used for indexing is SOLR. SOLR is an open-source enterprise search platform that provides fast and scalable indexing and searching capabilities. SOLR is used by SmartConsole to index the objects and rules in the security policy, as well as the logs and events in SmartLog and SmartEvent. SOLR enables quick and easy access to the relevant information in the management database.

Reference:Check Point Security Expert R81 Course, SOLR Troubleshooting

After making modifications to the $CVPNDIR/conf/cvpnd.C file, how would you restart the daemon?

A.
cvpnd_restart
A.
cvpnd_restart
Answers
B.
cvpnd_restart
B.
cvpnd_restart
Answers
C.
cvpnd restart
C.
cvpnd restart
Answers
D.
cvpnrestart
D.
cvpnrestart
Answers
Suggested answer: B

Explanation:

The cvpnd_restart command is used to restart the daemon after making modifications to the $CVPNDIR/conf/cvpnd.C file. The cvpnd daemon is responsible for managing the communication between the Check Point components and the Content Vectoring Protocol (CVP) server. The CVP server is an external server that provides content inspection and filtering services for Check Point gateways. The $CVPNDIR/conf/cvpnd.C file contains the configuration settings for the cvpnd daemon, such as the CVP server IP address, port number, timeout value, and debug level.

Reference:Check Point Security Expert R81 Course, Content Inspection Using ICAP, cvpnd daemon debug file

SandBlast has several functional components that work together to ensure that attacks are prevented in real-time. Which the following is NOT part of the SandBlast component?

A.
Threat Emulation
A.
Threat Emulation
Answers
B.
Mobile Access
B.
Mobile Access
Answers
C.
Mail Transfer Agent
C.
Mail Transfer Agent
Answers
D.
Threat Cloud
D.
Threat Cloud
Answers
Suggested answer: B

Explanation:

Mobile Access is not part of the SandBlast component. Mobile Access is a software blade that provides secure remote access to corporate resources from various devices, such as smartphones, tablets, and laptops. Mobile Access supports different connectivity methods, such as SSL VPN, IPsec VPN, and Mobile Enterprise Application Store (MEAS). Mobile Access also integrates with Mobile Threat Prevention (MTP) to protect mobile devices from malware and network attacks.

Reference:Check Point Security Expert R81 Course, Mobile Access Administration Guide, SandBlast Mobile Datasheet

Total 626 questions
Go to page: of 63