ExamGecko
Home Home / Checkpoint / 156-315.81

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 21

Question list
Search
Search

An administrator would like to troubleshoot why templating is not working for some traffic. How can he determine at which rule templating is disabled?

A.
He can use the fw accel stat command on the gateway.
A.
He can use the fw accel stat command on the gateway.
Answers
B.
He can use the fw accel statistics command on the gateway.
B.
He can use the fw accel statistics command on the gateway.
Answers
C.
He can use the fwaccel stat command on the Security Management Server.
C.
He can use the fwaccel stat command on the Security Management Server.
Answers
D.
He can use the fwaccel stat command on the gateway
D.
He can use the fwaccel stat command on the gateway
Answers
Suggested answer: D

Explanation:

Thefwaccel statcommand on the gateway shows the status of SecureXL acceleration, including the number of accelerated and non-accelerated connections, and the reason for non-acceleration. The reason for non-acceleration can be either a rule that disables templating, or a feature that is not supported by SecureXL. To determine which rule disables templating, the administrator can use the-soption to show the rule numbers and names. For example:

Which web services protocol is used to communicate to the Check Point R81 Identity Awareness Web API?

A.
SOAP
A.
SOAP
Answers
B.
REST
B.
REST
Answers
C.
XLANG
C.
XLANG
Answers
D.
XML-RPC
D.
XML-RPC
Answers
Suggested answer: B

Explanation:

The Check Point R81 Identity Awareness Web API uses theRESTweb services protocol to communicate with external identity sources. REST stands for Representational State Transfer, and it is an architectural style for designing web services that use HTTP methods to access and manipulate resources.The Identity Awareness Web API allows external identity sources to send identity and session information to the Security Gateway, which can then use this information for policy enforcement.

What is mandatory for ClusterXL to work properly?

A.
The number of cores must be the same on every participating cluster node
A.
The number of cores must be the same on every participating cluster node
Answers
B.
The Magic MAC number must be unique per cluster node
B.
The Magic MAC number must be unique per cluster node
Answers
C.
The Sync interface must not have an IP address configured
C.
The Sync interface must not have an IP address configured
Answers
D.
If you have ''Non-monitored Private'' interfaces, the number of those interfaces must be the same on all cluster members
D.
If you have ''Non-monitored Private'' interfaces, the number of those interfaces must be the same on all cluster members
Answers
Suggested answer: B

Explanation:

For ClusterXL to work properly, one of the mandatory requirements is that theMagic MAC numbermust be unique per cluster node. The Magic MAC number is a MAC address that is used by ClusterXL to hide the physical MAC addresses of the cluster members from the network. This way, the cluster can present a single virtual MAC address to the network, and avoid ARP issues when a failover occurs. The Magic MAC number is derived from the Cluster Virtual IP address, which must also be unique per cluster.

Please choose correct command to add an ''emailserver1'' host with IP address 10.50.23.90 using GAiA management CLI?

A.
host name myHost12 ip-address 10.50.23.90
A.
host name myHost12 ip-address 10.50.23.90
Answers
B.
mgmt: add host name ip-address 10.50.23.90
B.
mgmt: add host name ip-address 10.50.23.90
Answers
C.
add host name emailserver1 ip-address 10.50.23.90
C.
add host name emailserver1 ip-address 10.50.23.90
Answers
D.
mgmt: add host name emailserver1 ip-address 10.50.23.90
D.
mgmt: add host name emailserver1 ip-address 10.50.23.90
Answers
Suggested answer: D

Explanation:

The correct command to add an ''emailserver1'' host with IP address 10.50.23.90 using GAiA management CLI ismgmt: add host name emailserver1 ip-address 10.50.23.90. This command will create a new host object in the Security Management Server database, with the specified name and IP address. Themgmt:prefix indicates that the command is executed on the Security Management Server, and not on the local GAiA machine. The other commands are either missing themgmt:prefix, or have incorrect syntax or parameters.

Using Threat Emulation technologies, what is the best way to block .exe and .bat file types?

A.
enable DLP and select.exe and .bat file type
A.
enable DLP and select.exe and .bat file type
Answers
B.
enable .exe & .bat protection in IPS Policy
B.
enable .exe & .bat protection in IPS Policy
Answers
C.
create FW rule for particular protocol
C.
create FW rule for particular protocol
Answers
D.
tecli advanced attributes set prohibited_file_types exe.bat
D.
tecli advanced attributes set prohibited_file_types exe.bat
Answers
Suggested answer: A

Explanation:

The best way to block .exe and .bat file types using Threat Emulation technologies is toenable DLP and select .exe and .bat file type. DLP stands for Data Loss Prevention, and it is a feature that allows administrators to define rules and actions to protect sensitive data from unauthorized access or transfer. One of the DLP rule conditions is File Type, which can be used to block or alert on specific file types, such as .exe and .bat, that may contain malicious code or scripts. The other options are either not related to Threat Emulation technologies, or not effective in blocking .exe and .bat file types.

Topic 3, Exam Pool C

What is the recommended number of physical network interfaces in a Mobile Access cluster deployment?

A.
4 Interfaces -- an interface leading to the organization, a second interface leading to the internet, a third interface for synchronization, a fourth interface leading to the Security Management Server.
A.
4 Interfaces -- an interface leading to the organization, a second interface leading to the internet, a third interface for synchronization, a fourth interface leading to the Security Management Server.
Answers
B.
3 Interfaces -- an interface leading to the organization, a second interface leading to the Internet, a third interface for synchronization.
B.
3 Interfaces -- an interface leading to the organization, a second interface leading to the Internet, a third interface for synchronization.
Answers
C.
1 Interface -- an interface leading to the organization and the Internet, and configure for synchronization.
C.
1 Interface -- an interface leading to the organization and the Internet, and configure for synchronization.
Answers
D.
2 Interfaces -- a data interface leading to the organization and the Internet, a second interface for synchronization.
D.
2 Interfaces -- a data interface leading to the organization and the Internet, a second interface for synchronization.
Answers
Suggested answer: B

Explanation:

According to the Check Point R81 Mobile Access Administration Guide, the recommended number of physical network interfaces in a Mobile Access cluster deployment isthree. One interface should be connected to the organization network, one interface should be connected to the Internet, and one interface should be used for synchronization between cluster members.This configuration provides optimal performance and security for Mobile Access traffic.

Which process handles connection from SmartConsole R81?

A.
fwm
A.
fwm
Answers
B.
cpmd
B.
cpmd
Answers
C.
cpm
C.
cpm
Answers
D.
cpd
D.
cpd
Answers
Suggested answer: C

Explanation:

The process that handles connection from SmartConsole R81 iscpm. Cpm stands for Check Point Management, and it is the main process that runs on the Security Management Server and interacts with SmartConsole clients. Cpm is responsible for managing policies, objects, logs, tasks, and other management functions.The other processes are either obsolete or irrelevant for SmartConsole connection.

What is the command to show SecureXL status?

A.
fwaccel status
A.
fwaccel status
Answers
B.
fwaccel stats -m
B.
fwaccel stats -m
Answers
C.
fwaccel -s
C.
fwaccel -s
Answers
D.
fwaccel stat
D.
fwaccel stat
Answers
Suggested answer: D

Explanation:

The command to show SecureXL status isfwaccel stat. This command displays information about SecureXL acceleration, such as the number of accelerated and non-accelerated connections, the reason for non-acceleration, and the SecureXL device name and mode.The other commands are either invalid or show different statistics.

The SmartEvent R81 Web application for real-time event monitoring is called:

A.
SmartView Monitor
A.
SmartView Monitor
Answers
B.
SmartEventWeb
B.
SmartEventWeb
Answers
C.
There is no Web application for SmartEvent
C.
There is no Web application for SmartEvent
Answers
D.
SmartView
D.
SmartView
Answers
Suggested answer: B

Explanation:

The SmartEvent R81 Web application for real-time event monitoring is calledSmartEventWeb. SmartEventWeb is a web-based interface that allows administrators to view and analyze security events from various sources, such as logs, reports, incidents, and indicators. SmartEventWeb provides dashboards, widgets, filters, and drill-down options to help administrators gain insights into their security posture. The other options are either incorrect or refer to different applications.

What will SmartEvent automatically define as events?

A.
Firewall
A.
Firewall
Answers
B.
VPN
B.
VPN
Answers
C.
IPS
C.
IPS
Answers
D.
HTTPS
D.
HTTPS
Answers
Suggested answer: C

Explanation:

SmartEvent automatically defines events based onIPS(Intrusion Prevention System) alerts. IPS is a feature that detects and prevents malicious network traffic based on predefined or custom signatures. IPS alerts are generated when IPS detects an attack or an anomaly that matches a signature. SmartEvent collects and correlates IPS alerts from different gateways and displays them as events in SmartEventWeb. The other options are not automatically defined as events by SmartEvent.

Total 626 questions
Go to page: of 63