ExamGecko
Home Home / Checkpoint / 156-315.81

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 22

Question list
Search
Search

With MTA (Mail Transfer Agent) enabled the gateways manages SMTP traffic and holds external email with potentially malicious attachments. What is required in order to enable MTA (Mail Transfer Agent) functionality in the Security Gateway?

A.
Threat Cloud Intelligence
A.
Threat Cloud Intelligence
Answers
B.
Threat Prevention Software Blade Package
B.
Threat Prevention Software Blade Package
Answers
C.
Endpoint Total Protection
C.
Endpoint Total Protection
Answers
D.
Traffic on port 25
D.
Traffic on port 25
Answers
Suggested answer: B

Explanation:

To enable MTA (Mail Transfer Agent) functionality in the Security Gateway, theThreat Prevention Software Blade Packageis required. The Threat Prevention Software Blade Package includes the Anti-Virus, Anti-Bot, and Threat Emulation blades, which can scan and hold external email with potentially malicious attachments. The MTA functionality allows the Security Gateway to act as an SMTP relay between the mail server and the Internet, and apply Threat Prevention policies to the email traffic.The other options are either not related or not sufficient to enable MTA functionality. R

What is not a purpose of the deployment of Check Point API?

A.
Execute an automated script to perform common tasks
A.
Execute an automated script to perform common tasks
Answers
B.
Create a customized GUI Client for manipulating the objects database
B.
Create a customized GUI Client for manipulating the objects database
Answers
C.
Create products that use and enhance the Check Point solution
C.
Create products that use and enhance the Check Point solution
Answers
D.
Integrate Check Point products with 3rd party solution
D.
Integrate Check Point products with 3rd party solution
Answers
Suggested answer: B

Explanation:

The deployment of Check Point API does not have the purpose of creating a customized GUI Client for manipulating the objects database. The Check Point API is a web service that allows external applications to interact with the Check Point management server using standard methods such as HTTP(S) requests and JSON objects. The Check Point API can be used to execute an automated script to perform common tasks, create products that use and enhance the Check Point solution, and integrate Check Point products with 3rd party solutions.However, creating a customized GUI Client for manipulating the objects database is not a supported or intended use case of the Check Point API.

You need to change the number of firewall Instances used by CoreXL. How can you achieve this goal?

A.
edit fwaffinity.conf; reboot required
A.
edit fwaffinity.conf; reboot required
Answers
B.
cpconfig; reboot required
B.
cpconfig; reboot required
Answers
C.
edit fwaffinity.conf; reboot not required
C.
edit fwaffinity.conf; reboot not required
Answers
D.
cpconfig; reboot not required
D.
cpconfig; reboot not required
Answers
Suggested answer: B

Explanation:

To change the number of firewall instances used by CoreXL, thecpconfigcommand must be used, followed by a reboot. CoreXL is a technology that improves the performance of the Security Gateway by using multiple cores to handle concurrent connections. The number of firewall instances determines how many cores are dedicated to CoreXL. The cpconfig command allows the administrator to configure various settings on the Security Gateway, including the number of firewall instances. After changing this setting, a reboot is required for the changes to take effect. The other commands are either incorrect or do not require a reboot.

Fill in the blank: Identity Awareness AD-Query is using the Microsoft _______________ API to learn users from AD.

A.
WMI
A.
WMI
Answers
B.
Eventvwr
B.
Eventvwr
Answers
C.
XML
C.
XML
Answers
D.
Services.msc
D.
Services.msc
Answers
Suggested answer: A

Explanation:

Identity Awareness AD-Query is using the MicrosoftWMIAPI to learn users from AD. WMI stands for Windows Management Instrumentation, and it is an API that allows remote management and monitoring of Windows systems. Identity Awareness AD-Query is a feature that enables the Security Gateway to query Active Directory servers for user and computer information, such as login events, group membership, and IP addresses. By using the WMI API, Identity Awareness AD-Query can receive real-time notifications from Active Directory servers without installing any agents or scripts on them.

Which is not a blade option when configuring SmartEvent?

A.
Correlation Unit
A.
Correlation Unit
Answers
B.
SmartEvent Unit
B.
SmartEvent Unit
Answers
C.
SmartEvent Server
C.
SmartEvent Server
Answers
D.
Log Server
D.
Log Server
Answers
Suggested answer: B

Explanation:

SmartEvent Unitis not a blade option when configuring SmartEvent. SmartEvent is a unified security event management solution that provides visibility, analysis, and reporting of security events across multiple Check Point products. SmartEvent consists of three main components: SmartEvent Server, Correlation Unit, and Log Server. SmartEvent Server is responsible for storing and displaying security events in SmartConsole and SmartEventWeb. Correlation Unit is responsible for collecting and correlating logs from various sources and generating security events based on predefined or custom scenarios. Log Server is responsible for receiving and indexing logs from Security Gateways and other Check Point modules. SmartEvent Unit is not a valid component or blade of SmartEvent.

In which formats can Threat Emulation forensics reports be viewed in?

A.
TXT, XML and CSV
A.
TXT, XML and CSV
Answers
B.
PDF and TXT
B.
PDF and TXT
Answers
C.
PDF, HTML, and XML
C.
PDF, HTML, and XML
Answers
D.
PDF and HTML
D.
PDF and HTML
Answers
Suggested answer: C

Explanation:

The formats in which Threat Emulation forensics reports can be viewed in arePDF, HTML, and XML. Threat Emulation is a feature that detects and prevents zero-day attacks by emulating files in a sandbox environment and analyzing their behavior. Threat Emulation generates forensics reports that provide detailed information about the emulated files, such as verdict, severity, activity summary, screenshots, network activity, registry activity, file activity, and process activity. These reports can be viewed in PDF, HTML, or XML formats from SmartConsole or SmartView.

In ClusterXL Load Sharing Multicast Mode:

A.
only the primary member received packets sent to the cluster IP address
A.
only the primary member received packets sent to the cluster IP address
Answers
B.
only the secondary member receives packets sent to the cluster IP address
B.
only the secondary member receives packets sent to the cluster IP address
Answers
C.
packets sent to the cluster IP address are distributed equally between all members of the cluster
C.
packets sent to the cluster IP address are distributed equally between all members of the cluster
Answers
D.
every member of the cluster received all of the packets sent to the cluster IP address
D.
every member of the cluster received all of the packets sent to the cluster IP address
Answers
Suggested answer: D

Explanation:

In ClusterXL Load Sharing Multicast Mode,every member of the cluster receives all of the packets sent to the cluster IP address. This mode uses multicast MAC addresses to distribute packets to all cluster members. Each member decides whether to accept or reject the packet based on a load balancing algorithm.This mode provides better performance and scalability than Unicast mode, but requires a switch that supports multicast MAC addresses.

What kind of information would you expect to see using the sim affinity command?

A.
The VMACs used in a Security Gateway cluster
A.
The VMACs used in a Security Gateway cluster
Answers
B.
The involved firewall kernel modules in inbound and outbound packet chain
B.
The involved firewall kernel modules in inbound and outbound packet chain
Answers
C.
Overview over SecureXL templated connections
C.
Overview over SecureXL templated connections
Answers
D.
Network interfaces and core distribution used for CoreXL
D.
Network interfaces and core distribution used for CoreXL
Answers
Suggested answer: D

Explanation:

The kind of information that you would expect to see using thesim affinitycommand isnetwork interfaces and core distribution used for CoreXL. Sim affinity is a command that allows administrators to view and modify the CPU core affinity of network interfaces and SecureXL instances. CoreXL is a technology that improves the performance of the Security Gateway by using multiple cores to handle concurrent connections.The sim affinity command can show which network interfaces and SecureXL instances are bound to which CPU cores, and allow administrators to change the affinity settings.

What cloud-based SandBlast Mobile application is used to register new devices and users?

A.
Check Point Protect Application
A.
Check Point Protect Application
Answers
B.
Management Dashboard
B.
Management Dashboard
Answers
C.
Behavior Risk Engine
C.
Behavior Risk Engine
Answers
D.
Check Point Gateway
D.
Check Point Gateway
Answers
Suggested answer: D

Explanation:

The cloud-based SandBlast Mobile application that is used to register new devices and users isCheck Point Gateway. Check Point Gateway is a web portal that allows administrators to enroll devices and users into the SandBlast Mobile service, which is a cloud-based solution that protects mobile devices from advanced threats. Check Point Gateway also allows administrators to configure policies, monitor device status, and generate reports for SandBlast Mobile.

What is the responsibility of SOLR process on R81.20 management server?

A.
Validating all data before it's written into the database
A.
Validating all data before it's written into the database
Answers
B.
It generates indexes of data written to the database
B.
It generates indexes of data written to the database
Answers
C.
Communication between SmartConsole applications and the Security Management Server
C.
Communication between SmartConsole applications and the Security Management Server
Answers
D.
Writing all information into the database
D.
Writing all information into the database
Answers
Suggested answer: B

Explanation:

The responsibility of SOLR process on R81.20 management server isto generate indexes of data written to the database. SOLR is an open source search platform that provides fast and scalable indexing and querying capabilities. SOLR is used by the R81.20 management server to index data such as logs, objects, policies, tasks, and events, and to enable quick and efficient searches on this data by SmartConsole and SmartView applications.

Total 626 questions
Go to page: of 63