ExamGecko
Home / Checkpoint / 156-315.81 / List of questions
Ask Question

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 2

Add to Whishlist

List of questions

Question 11

Report Export Collapse

Using mgmt_cli, what is the correct syntax to import a host object called Server_1 from the CLI?

mgmt_cli add-host ''Server_1'' ip_address ''10.15.123.10'' --format txt
mgmt_cli add-host ''Server_1'' ip_address ''10.15.123.10'' --format txt
mgmt_cli add host name ''Server_1'' ip-address ''10.15.123.10'' --format json
mgmt_cli add host name ''Server_1'' ip-address ''10.15.123.10'' --format json
mgmt_cli add object-host ''Server_1'' ip-address ''10.15.123.10'' --format json
mgmt_cli add object-host ''Server_1'' ip-address ''10.15.123.10'' --format json
mgmt._cli add object ''Server-1'' ip-address ''10.15.123.10'' --format json
mgmt._cli add object ''Server-1'' ip-address ''10.15.123.10'' --format json
Suggested answer: B
Explanation:

The correct syntax to import a host object using mgmt_cli ismgmt_cli add host name <name> ip-address <ip-address> --format <format>1. The name and ip-address parameters are mandatory, while the format parameter is optional and can be either json or txt.The other options are incorrect because they either use wrong parameters, wrong hyphens, or wrong object types.

Reference:1: Check Point Resource Library2

asked 16/09/2024
Saran Lertrat
31 questions

Question 12

Report Export Collapse

What are the steps to configure the HTTPS Inspection Policy?

Go to Manage&Settings > Blades > HTTPS Inspection > Configure in SmartDashboard
Go to Manage&Settings > Blades > HTTPS Inspection > Configure in SmartDashboard
Go to Application&url filtering blade > Advanced > Https Inspection > Policy
Go to Application&url filtering blade > Advanced > Https Inspection > Policy
Go to Manage&Settings > Blades > HTTPS Inspection > Policy
Go to Manage&Settings > Blades > HTTPS Inspection > Policy
Go to Application&url filtering blade > Https Inspection > Policy
Go to Application&url filtering blade > Https Inspection > Policy
Suggested answer: A
Explanation:

The correct steps to configure the HTTPS Inspection Policy in Check Point R81 are as follows1:

Go toManage&Settings > Blades > HTTPS Inspection > Configurein SmartDashboard.

EnableHTTPS Inspectionand select thePolicytab.

Create a newHTTPS Inspection Layeror edit an existing one.

Define therulesfor inspecting HTTPS traffic based on the source, destination, service, and action.

Install thepolicyon the relevant gateways.

The other options are incorrect because they either use wrong blade names, wrong menu options, or wrong configuration steps.

Reference:1: LAB:25 How to Configure HTTPS Inspection in Check Point Firewall R81(https://www.youtube.com/watch?v=NCvV7-R9ZgU)

asked 16/09/2024
Andres Montero
42 questions

Question 13

Report Export Collapse

You want to store the GAIA configuration in a file for later reference. What command should you use?

write mem <filename>
write mem <filename>
show config --f <filename>
show config --f <filename>
save config --o <filename>
save config --o <filename>
save configuration <filename>
save configuration <filename>
Suggested answer: D
Explanation:

The correct command to store the GAIA configuration in a file issave configuration <filename>1.This will create a file with the current system level configuration in the home directory of the current user1.The other commands are incorrect because they either do not exist or do not save the configuration to a file.

Reference:1: Backing up Gaia system level configuration(https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102234)

asked 16/09/2024
MOHD SAIFUL SYAHMI SAIFUDDIN
42 questions

Question 14

Report Export Collapse

How do Capsule Connect and Capsule Workspace differ?

Capsule Connect provides a Layer3 VPN. Capsule Workspace provides a Desktop with usable applications.
Capsule Connect provides a Layer3 VPN. Capsule Workspace provides a Desktop with usable applications.
Capsule Workspace can provide access to any application.
Capsule Workspace can provide access to any application.
Capsule Connect provides Business data isolation.
Capsule Connect provides Business data isolation.
Capsule Connect does not require an installed application at client.
Capsule Connect does not require an installed application at client.
Suggested answer: A
Explanation:

Capsule Connect and Capsule Workspace are both components of Check Point's remote access solution, but they serve different purposes and have distinct features:

A) Capsule Connect provides a Layer 3 VPN, which allows remote users to connect securely to their corporate network. It typically provides network-level access, allowing users to access resources on the corporate network. On the other hand, Capsule Workspace provides a secure workspace environment, including a virtual desktop with usable applications. It is more focused on providing application-level access to users in a secure manner.

B) This statement is partially true. Capsule Workspace is designed to provide secure access to a wide range of applications and resources, not limited to specific applications.

C) Capsule Connect does provide business data isolation by creating a secure VPN tunnel for remote users, ensuring that their network traffic is isolated from the public internet.

D) Capsule Connect usually requires an installed application or VPN client on the client device to establish a secure connection to the corporate network. This statement is not entirely accurate because an installed application or client is typically required.

Therefore, option A is the correct answer as it accurately distinguishes between Capsule Connect and Capsule Workspace based on their primary functionalities.

asked 16/09/2024
KENEILWE DITHLAGE
49 questions

Question 15

Report Export Collapse

John detected high load on sync interface. Which is most recommended solution?

For short connections like http service -- delay sync for 2 seconds
For short connections like http service -- delay sync for 2 seconds
Add a second interface to handle sync traffic
Add a second interface to handle sync traffic
For short connections like http service -- do not sync
For short connections like http service -- do not sync
For short connections like icmp service -- delay sync for 2 seconds
For short connections like icmp service -- delay sync for 2 seconds
Suggested answer: A
Explanation:

When John detects a high load on the sync interface, the recommended solution is to implement a delay in the sync process for short-lived connections like HTTP. Here's an explanation of each option:

A) Delaying the sync for 2 seconds for short connections like HTTP services is a common practice to reduce the load on the sync interface. This allows the interface to handle the incoming connections more effectively.

B) Adding a second interface to handle sync traffic might be a viable solution, but it can be more complex and costly compared to implementing a delay for short connections.

C) Not syncing short connections like HTTP services is not a recommended approach because it may lead to synchronization issues and potential data inconsistencies between cluster members.

D) Delaying the sync for ICMP (ping) services is not a common practice and may not effectively address the high load issue on the sync interface.

Therefore, option A is the most recommended solution as it addresses the issue by introducing a delay for short-lived connections, optimizing the sync process without causing synchronization problems.

asked 16/09/2024
J.J. van Ingen
43 questions

Question 16

Report Export Collapse

Which of these is an implicit MEP option?

Primary-backup
Primary-backup
Source address based
Source address based
Round robin
Round robin
Load Sharing
Load Sharing
Suggested answer: A
Explanation:

Implicit MEP (Multicast Ethernet Point) options refer to the way multicast traffic is handled within a network. In this case, the question is asking about an implicit MEP option, and the correct answer is:

A) Primary-backup: This is an implicit MEP option where one switch (primary) forwards multicast traffic while the other switch (backup) does not forward the traffic. It is used to ensure redundancy in case the primary switch fails.

B) Source address-based, C. Round-robin, and D. Load Sharing are not implicit MEP options; they are different methods of handling multicast traffic and do not describe the concept of primary-backup.

Therefore, option A is the correct answer as it represents an implicit MEP option.

asked 16/09/2024
Ronald Buffing
45 questions

Question 17

Report Export Collapse

Which Check Point daemon monitors the other daemons?

fwm
fwm
cpd
cpd
cpwd
cpwd
fwssd
fwssd
Suggested answer: C
Explanation:

The Check Point daemon that monitors the other daemons is cpwd (Check Point Watchdog). It is responsible for monitoring the health and status of various Check Point daemons and processes running on the Security Gateway. If any daemon or process stops responding or encounters an issue, cpwd can restart it to ensure the continued operation of the Security Gateway.

asked 16/09/2024
RAOUL AMODIO
53 questions

Question 18

Report Export Collapse

What is the least amount of CPU cores required to enable CoreXL?

2
2
1
1
4
4
6
6
Suggested answer: A
Explanation:

The least amount of CPU cores required to enable CoreXL is2. CoreXL is a technology that improves the performance of Security Gateways by using multiple CPU cores to process traffic in parallel. CoreXL requires at least two CPU cores, one for SND (Secure Network Distributor) and one for a Firewall instance. The other options are either too few or too many CPU cores for enabling CoreXL.

Reference: [Check Point R81 SecureXL Administration Guide], [Check Point R81 Performance Tuning Administration Guide]

asked 16/09/2024
Anthony Agbale
51 questions

Question 19

Report Export Collapse

You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?

Eliminate all possible contradictory rules such as the Stealth or Cleanup rules.
Eliminate all possible contradictory rules such as the Stealth or Cleanup rules.
Create a separate Security Policy package for each remote Security Gateway.
Create a separate Security Policy package for each remote Security Gateway.
Create network objects that restricts all applicable rules to only certain networks.
Create network objects that restricts all applicable rules to only certain networks.
Run separate SmartConsole instances to login and configure each Security Gateway directly.
Run separate SmartConsole instances to login and configure each Security Gateway directly.
Suggested answer: B
Explanation:

To simplify security administration when working with multiple Security Gateways enforcing an extensive number of rules, you would choose to create a separate Security Policy package for each remote Security Gateway. A Security Policy package is a set of rules and objects that can be assigned to one or more Security Gateways.This allows you to manage different policies for different gateways from the same Management Server1. The other options are either not effective or not feasible for simplifying security administration.

Reference:Check Point R81 Security Management Administration Guide

asked 16/09/2024
Mohamed Abdul Haq Mohamed Akram
52 questions

Question 20

Report Export Collapse

Which of the following authentication methods ARE NOT used for Mobile Access?

RADIUS server
RADIUS server
Username and password (internal, LDAP)
Username and password (internal, LDAP)
SecurID
SecurID
TACACS+
TACACS+
Suggested answer: D
Explanation:

TACACS+ is not an authentication method that is used for Mobile Access.Mobile Access supports the following authentication methods: username and password (internal, LDAP, or RADIUS), certificate, SecurID, DynamicID, and SMS2.TACACS+ is a protocol that provides access control for routers, network access servers, and other network devices, but it is not supported by Mobile Access3.

Reference:Check Point R81 Mobile Access Administration Guide, TACACS+ - Wikipedia

asked 16/09/2024
Luis Hernaiz
45 questions
Total 626 questions
Go to page: of 63