Checkpoint 156-315.81 Practice Test - Questions Answers, Page 2

List of questions
Question 11

Using mgmt_cli, what is the correct syntax to import a host object called Server_1 from the CLI?
The correct syntax to import a host object using mgmt_cli ismgmt_cli add host name <name> ip-address <ip-address> --format <format>1. The name and ip-address parameters are mandatory, while the format parameter is optional and can be either json or txt.The other options are incorrect because they either use wrong parameters, wrong hyphens, or wrong object types.
Reference:1: Check Point Resource Library2
Question 12

What are the steps to configure the HTTPS Inspection Policy?
The correct steps to configure the HTTPS Inspection Policy in Check Point R81 are as follows1:
Go toManage&Settings > Blades > HTTPS Inspection > Configurein SmartDashboard.
EnableHTTPS Inspectionand select thePolicytab.
Create a newHTTPS Inspection Layeror edit an existing one.
Define therulesfor inspecting HTTPS traffic based on the source, destination, service, and action.
Install thepolicyon the relevant gateways.
The other options are incorrect because they either use wrong blade names, wrong menu options, or wrong configuration steps.
Reference:1: LAB:25 How to Configure HTTPS Inspection in Check Point Firewall R81(https://www.youtube.com/watch?v=NCvV7-R9ZgU)
Question 13

You want to store the GAIA configuration in a file for later reference. What command should you use?
The correct command to store the GAIA configuration in a file issave configuration <filename>1.This will create a file with the current system level configuration in the home directory of the current user1.The other commands are incorrect because they either do not exist or do not save the configuration to a file.
Reference:1: Backing up Gaia system level configuration(https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102234)
Question 14

How do Capsule Connect and Capsule Workspace differ?
Capsule Connect and Capsule Workspace are both components of Check Point's remote access solution, but they serve different purposes and have distinct features:
A) Capsule Connect provides a Layer 3 VPN, which allows remote users to connect securely to their corporate network. It typically provides network-level access, allowing users to access resources on the corporate network. On the other hand, Capsule Workspace provides a secure workspace environment, including a virtual desktop with usable applications. It is more focused on providing application-level access to users in a secure manner.
B) This statement is partially true. Capsule Workspace is designed to provide secure access to a wide range of applications and resources, not limited to specific applications.
C) Capsule Connect does provide business data isolation by creating a secure VPN tunnel for remote users, ensuring that their network traffic is isolated from the public internet.
D) Capsule Connect usually requires an installed application or VPN client on the client device to establish a secure connection to the corporate network. This statement is not entirely accurate because an installed application or client is typically required.
Therefore, option A is the correct answer as it accurately distinguishes between Capsule Connect and Capsule Workspace based on their primary functionalities.
Question 15

John detected high load on sync interface. Which is most recommended solution?
When John detects a high load on the sync interface, the recommended solution is to implement a delay in the sync process for short-lived connections like HTTP. Here's an explanation of each option:
A) Delaying the sync for 2 seconds for short connections like HTTP services is a common practice to reduce the load on the sync interface. This allows the interface to handle the incoming connections more effectively.
B) Adding a second interface to handle sync traffic might be a viable solution, but it can be more complex and costly compared to implementing a delay for short connections.
C) Not syncing short connections like HTTP services is not a recommended approach because it may lead to synchronization issues and potential data inconsistencies between cluster members.
D) Delaying the sync for ICMP (ping) services is not a common practice and may not effectively address the high load issue on the sync interface.
Therefore, option A is the most recommended solution as it addresses the issue by introducing a delay for short-lived connections, optimizing the sync process without causing synchronization problems.
Question 16

Which of these is an implicit MEP option?
Implicit MEP (Multicast Ethernet Point) options refer to the way multicast traffic is handled within a network. In this case, the question is asking about an implicit MEP option, and the correct answer is:
A) Primary-backup: This is an implicit MEP option where one switch (primary) forwards multicast traffic while the other switch (backup) does not forward the traffic. It is used to ensure redundancy in case the primary switch fails.
B) Source address-based, C. Round-robin, and D. Load Sharing are not implicit MEP options; they are different methods of handling multicast traffic and do not describe the concept of primary-backup.
Therefore, option A is the correct answer as it represents an implicit MEP option.
Question 17

Which Check Point daemon monitors the other daemons?
The Check Point daemon that monitors the other daemons is cpwd (Check Point Watchdog). It is responsible for monitoring the health and status of various Check Point daemons and processes running on the Security Gateway. If any daemon or process stops responding or encounters an issue, cpwd can restart it to ensure the continued operation of the Security Gateway.
Question 18

What is the least amount of CPU cores required to enable CoreXL?
The least amount of CPU cores required to enable CoreXL is2. CoreXL is a technology that improves the performance of Security Gateways by using multiple CPU cores to process traffic in parallel. CoreXL requires at least two CPU cores, one for SND (Secure Network Distributor) and one for a Firewall instance. The other options are either too few or too many CPU cores for enabling CoreXL.
Reference: [Check Point R81 SecureXL Administration Guide], [Check Point R81 Performance Tuning Administration Guide]
Question 19

You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?
To simplify security administration when working with multiple Security Gateways enforcing an extensive number of rules, you would choose to create a separate Security Policy package for each remote Security Gateway. A Security Policy package is a set of rules and objects that can be assigned to one or more Security Gateways.This allows you to manage different policies for different gateways from the same Management Server1. The other options are either not effective or not feasible for simplifying security administration.
Reference:Check Point R81 Security Management Administration Guide
Question 20

Which of the following authentication methods ARE NOT used for Mobile Access?
TACACS+ is not an authentication method that is used for Mobile Access.Mobile Access supports the following authentication methods: username and password (internal, LDAP, or RADIUS), certificate, SecurID, DynamicID, and SMS2.TACACS+ is a protocol that provides access control for routers, network access servers, and other network devices, but it is not supported by Mobile Access3.
Reference:Check Point R81 Mobile Access Administration Guide, TACACS+ - Wikipedia
Question