ExamGecko
Home Home / Checkpoint / 156-315.81

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 2

Question list
Search
Search

Using mgmt_cli, what is the correct syntax to import a host object called Server_1 from the CLI?

A.
mgmt_cli add-host ''Server_1'' ip_address ''10.15.123.10'' --format txt
A.
mgmt_cli add-host ''Server_1'' ip_address ''10.15.123.10'' --format txt
Answers
B.
mgmt_cli add host name ''Server_1'' ip-address ''10.15.123.10'' --format json
B.
mgmt_cli add host name ''Server_1'' ip-address ''10.15.123.10'' --format json
Answers
C.
mgmt_cli add object-host ''Server_1'' ip-address ''10.15.123.10'' --format json
C.
mgmt_cli add object-host ''Server_1'' ip-address ''10.15.123.10'' --format json
Answers
D.
mgmt._cli add object ''Server-1'' ip-address ''10.15.123.10'' --format json
D.
mgmt._cli add object ''Server-1'' ip-address ''10.15.123.10'' --format json
Answers
Suggested answer: B

Explanation:

The correct syntax to import a host object using mgmt_cli ismgmt_cli add host name <name> ip-address <ip-address> --format <format>1. The name and ip-address parameters are mandatory, while the format parameter is optional and can be either json or txt.The other options are incorrect because they either use wrong parameters, wrong hyphens, or wrong object types.

Reference:1: Check Point Resource Library2

What are the steps to configure the HTTPS Inspection Policy?

A.
Go to Manage&Settings > Blades > HTTPS Inspection > Configure in SmartDashboard
A.
Go to Manage&Settings > Blades > HTTPS Inspection > Configure in SmartDashboard
Answers
B.
Go to Application&url filtering blade > Advanced > Https Inspection > Policy
B.
Go to Application&url filtering blade > Advanced > Https Inspection > Policy
Answers
C.
Go to Manage&Settings > Blades > HTTPS Inspection > Policy
C.
Go to Manage&Settings > Blades > HTTPS Inspection > Policy
Answers
D.
Go to Application&url filtering blade > Https Inspection > Policy
D.
Go to Application&url filtering blade > Https Inspection > Policy
Answers
Suggested answer: A

Explanation:

The correct steps to configure the HTTPS Inspection Policy in Check Point R81 are as follows1:

Go toManage&Settings > Blades > HTTPS Inspection > Configurein SmartDashboard.

EnableHTTPS Inspectionand select thePolicytab.

Create a newHTTPS Inspection Layeror edit an existing one.

Define therulesfor inspecting HTTPS traffic based on the source, destination, service, and action.

Install thepolicyon the relevant gateways.

The other options are incorrect because they either use wrong blade names, wrong menu options, or wrong configuration steps.

Reference:1: LAB:25 How to Configure HTTPS Inspection in Check Point Firewall R81(https://www.youtube.com/watch?v=NCvV7-R9ZgU)

You want to store the GAIA configuration in a file for later reference. What command should you use?

A.
write mem <filename>
A.
write mem <filename>
Answers
B.
show config --f <filename>
B.
show config --f <filename>
Answers
C.
save config --o <filename>
C.
save config --o <filename>
Answers
D.
save configuration <filename>
D.
save configuration <filename>
Answers
Suggested answer: D

Explanation:

The correct command to store the GAIA configuration in a file issave configuration <filename>1.This will create a file with the current system level configuration in the home directory of the current user1.The other commands are incorrect because they either do not exist or do not save the configuration to a file.

Reference:1: Backing up Gaia system level configuration(https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102234)

How do Capsule Connect and Capsule Workspace differ?

A.
Capsule Connect provides a Layer3 VPN. Capsule Workspace provides a Desktop with usable applications.
A.
Capsule Connect provides a Layer3 VPN. Capsule Workspace provides a Desktop with usable applications.
Answers
B.
Capsule Workspace can provide access to any application.
B.
Capsule Workspace can provide access to any application.
Answers
C.
Capsule Connect provides Business data isolation.
C.
Capsule Connect provides Business data isolation.
Answers
D.
Capsule Connect does not require an installed application at client.
D.
Capsule Connect does not require an installed application at client.
Answers
Suggested answer: A

Explanation:

Capsule Connect and Capsule Workspace are both components of Check Point's remote access solution, but they serve different purposes and have distinct features:

A) Capsule Connect provides a Layer 3 VPN, which allows remote users to connect securely to their corporate network. It typically provides network-level access, allowing users to access resources on the corporate network. On the other hand, Capsule Workspace provides a secure workspace environment, including a virtual desktop with usable applications. It is more focused on providing application-level access to users in a secure manner.

B) This statement is partially true. Capsule Workspace is designed to provide secure access to a wide range of applications and resources, not limited to specific applications.

C) Capsule Connect does provide business data isolation by creating a secure VPN tunnel for remote users, ensuring that their network traffic is isolated from the public internet.

D) Capsule Connect usually requires an installed application or VPN client on the client device to establish a secure connection to the corporate network. This statement is not entirely accurate because an installed application or client is typically required.

Therefore, option A is the correct answer as it accurately distinguishes between Capsule Connect and Capsule Workspace based on their primary functionalities.

John detected high load on sync interface. Which is most recommended solution?

A.
For short connections like http service -- delay sync for 2 seconds
A.
For short connections like http service -- delay sync for 2 seconds
Answers
B.
Add a second interface to handle sync traffic
B.
Add a second interface to handle sync traffic
Answers
C.
For short connections like http service -- do not sync
C.
For short connections like http service -- do not sync
Answers
D.
For short connections like icmp service -- delay sync for 2 seconds
D.
For short connections like icmp service -- delay sync for 2 seconds
Answers
Suggested answer: A

Explanation:

When John detects a high load on the sync interface, the recommended solution is to implement a delay in the sync process for short-lived connections like HTTP. Here's an explanation of each option:

A) Delaying the sync for 2 seconds for short connections like HTTP services is a common practice to reduce the load on the sync interface. This allows the interface to handle the incoming connections more effectively.

B) Adding a second interface to handle sync traffic might be a viable solution, but it can be more complex and costly compared to implementing a delay for short connections.

C) Not syncing short connections like HTTP services is not a recommended approach because it may lead to synchronization issues and potential data inconsistencies between cluster members.

D) Delaying the sync for ICMP (ping) services is not a common practice and may not effectively address the high load issue on the sync interface.

Therefore, option A is the most recommended solution as it addresses the issue by introducing a delay for short-lived connections, optimizing the sync process without causing synchronization problems.

Which of these is an implicit MEP option?

A.
Primary-backup
A.
Primary-backup
Answers
B.
Source address based
B.
Source address based
Answers
C.
Round robin
C.
Round robin
Answers
D.
Load Sharing
D.
Load Sharing
Answers
Suggested answer: A

Explanation:

Implicit MEP (Multicast Ethernet Point) options refer to the way multicast traffic is handled within a network. In this case, the question is asking about an implicit MEP option, and the correct answer is:

A) Primary-backup: This is an implicit MEP option where one switch (primary) forwards multicast traffic while the other switch (backup) does not forward the traffic. It is used to ensure redundancy in case the primary switch fails.

B) Source address-based, C. Round-robin, and D. Load Sharing are not implicit MEP options; they are different methods of handling multicast traffic and do not describe the concept of primary-backup.

Therefore, option A is the correct answer as it represents an implicit MEP option.

Which Check Point daemon monitors the other daemons?

A.
fwm
A.
fwm
Answers
B.
cpd
B.
cpd
Answers
C.
cpwd
C.
cpwd
Answers
D.
fwssd
D.
fwssd
Answers
Suggested answer: C

Explanation:

The Check Point daemon that monitors the other daemons is cpwd (Check Point Watchdog). It is responsible for monitoring the health and status of various Check Point daemons and processes running on the Security Gateway. If any daemon or process stops responding or encounters an issue, cpwd can restart it to ensure the continued operation of the Security Gateway.

What is the least amount of CPU cores required to enable CoreXL?

A.
2
A.
2
Answers
B.
1
B.
1
Answers
C.
4
C.
4
Answers
D.
6
D.
6
Answers
Suggested answer: A

Explanation:

The least amount of CPU cores required to enable CoreXL is2. CoreXL is a technology that improves the performance of Security Gateways by using multiple CPU cores to process traffic in parallel. CoreXL requires at least two CPU cores, one for SND (Secure Network Distributor) and one for a Firewall instance. The other options are either too few or too many CPU cores for enabling CoreXL.

Reference: [Check Point R81 SecureXL Administration Guide], [Check Point R81 Performance Tuning Administration Guide]

You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?

A.
Eliminate all possible contradictory rules such as the Stealth or Cleanup rules.
A.
Eliminate all possible contradictory rules such as the Stealth or Cleanup rules.
Answers
B.
Create a separate Security Policy package for each remote Security Gateway.
B.
Create a separate Security Policy package for each remote Security Gateway.
Answers
C.
Create network objects that restricts all applicable rules to only certain networks.
C.
Create network objects that restricts all applicable rules to only certain networks.
Answers
D.
Run separate SmartConsole instances to login and configure each Security Gateway directly.
D.
Run separate SmartConsole instances to login and configure each Security Gateway directly.
Answers
Suggested answer: B

Explanation:

To simplify security administration when working with multiple Security Gateways enforcing an extensive number of rules, you would choose to create a separate Security Policy package for each remote Security Gateway. A Security Policy package is a set of rules and objects that can be assigned to one or more Security Gateways.This allows you to manage different policies for different gateways from the same Management Server1. The other options are either not effective or not feasible for simplifying security administration.

Reference:Check Point R81 Security Management Administration Guide

Which of the following authentication methods ARE NOT used for Mobile Access?

A.
RADIUS server
A.
RADIUS server
Answers
B.
Username and password (internal, LDAP)
B.
Username and password (internal, LDAP)
Answers
C.
SecurID
C.
SecurID
Answers
D.
TACACS+
D.
TACACS+
Answers
Suggested answer: D

Explanation:

TACACS+ is not an authentication method that is used for Mobile Access.Mobile Access supports the following authentication methods: username and password (internal, LDAP, or RADIUS), certificate, SecurID, DynamicID, and SMS2.TACACS+ is a protocol that provides access control for routers, network access servers, and other network devices, but it is not supported by Mobile Access3.

Reference:Check Point R81 Mobile Access Administration Guide, TACACS+ - Wikipedia

Total 626 questions
Go to page: of 63