ExamGecko
Home Home / Checkpoint / 156-315.81

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 23

Question list
Search
Search

In the Firewall chain mode FFF refers to:

A.
Stateful Packets
A.
Stateful Packets
Answers
B.
No Match
B.
No Match
Answers
C.
All Packets
C.
All Packets
Answers
D.
Stateless Packets
D.
Stateless Packets
Answers
Suggested answer: C

Explanation:

In the Firewall chain mode FFF refers toall packets. Firewall chain mode is a feature that allows administrators to define how packets are processed by different firewall kernel modules in inbound and outbound directions. FFF is one of the predefined chain modes that applies all firewall kernel modules (Firewall, VPN, IPS, etc.) to all packets, regardless of their state or connection. This mode provides maximum security, but also consumes more CPU resources.

Which file gives you a list of all security servers in use, including port number?

A.
$FWDIR/conf/conf.conf
A.
$FWDIR/conf/conf.conf
Answers
B.
$FWDIR/conf/servers.conf
B.
$FWDIR/conf/servers.conf
Answers
C.
$FWDIR/conf/fwauthd.conf
C.
$FWDIR/conf/fwauthd.conf
Answers
D.
$FWDIR/conf/serversd.conf
D.
$FWDIR/conf/serversd.conf
Answers
Suggested answer: C

Explanation:

The file that gives you a list of all security servers in use, including port number, is$FWDIR/conf/fwauthd.conf. Security servers are processes that handle application-level protocols such as HTTP, FTP, SMTP, etc., and perform security checks on them. Fwauthd.conf is a configuration file that defines which security servers are enabled, which ports they listen on, and which inspection points they are attached to.

Which of the following commands shows the status of processes?

A.
cpwd_admin -l
A.
cpwd_admin -l
Answers
B.
cpwd -l
B.
cpwd -l
Answers
C.
cpwd admin_list
C.
cpwd admin_list
Answers
D.
cpwd_admin list
D.
cpwd_admin list
Answers
Suggested answer: D

Explanation:

The command that shows the status of processes iscpwd_admin list. Cpwd_admin is a command that allows administrators to manage processes that are registered with the Check Point WatchDog (CPWD) daemon. CPWD is a daemon that monitors the health of critical processes on the Security Gateway or Management Server, and restarts them if they fail or stop responding. Cpwd_admin list shows the process name, PID, status, start time, monitor status, and number of restarts for each process registered with CPWD.

What is the valid range for VRID value in VRRP configuration?

A.
1 - 254
A.
1 - 254
Answers
B.
1 - 255
B.
1 - 255
Answers
C.
0 - 254
C.
0 - 254
Answers
D.
0 - 255
D.
0 - 255
Answers
Suggested answer: B

Explanation:

The valid range for VRID value in VRRP configuration is1 - 255. VRID stands for Virtual Router ID, and it is a number that identifies a virtual router in a VRRP cluster. A VRRP cluster consists of one or more routers that share a virtual IP address and provide redundancy and load balancing for network traffic. Each router in the cluster must have a unique VRID value, and the VRID value must match the VRID value configured on the interface that connects to the VRRP cluster.The VRID value can be any number from 1 to 255, inclusive.

What is true of the API server on R81.20?

A.
By default the API-server is activated and does not have hardware requirements.
A.
By default the API-server is activated and does not have hardware requirements.
Answers
B.
By default the API-server is not active and should be activated from the WebUI.
B.
By default the API-server is not active and should be activated from the WebUI.
Answers
C.
By default the API server is active on management and stand-alone servers with 16GB of RAM (or more).
C.
By default the API server is active on management and stand-alone servers with 16GB of RAM (or more).
Answers
D.
By default, the API server is active on management servers with 4 GB of RAM (or more) and on stand-alone servers with 8GB of RAM (or more).
D.
By default, the API server is active on management servers with 4 GB of RAM (or more) and on stand-alone servers with 8GB of RAM (or more).
Answers
Suggested answer: D

Explanation:

The true statement about the API server on R81.20 is: By default, the API server is active on management servers with 4 GB of RAM (or more) and on stand-alone servers with 8GB of RAM (or more). The API server is a web service that allows external applications to interact with the Check Point management server using standard methods such as HTTP(S) requests and JSON objects. The API server is enabled by default on R81.20 management servers that have at least 4 GB of RAM, and on stand-alone servers that have at least 8 GB of RAM.The API server can also be manually enabled or disabled from the WebUI or the CLI.

To ensure that VMAC mode is enabled, which CLI command should you run on all cluster members?

A.
fw ctl set int fwha vmac global param enabled
A.
fw ctl set int fwha vmac global param enabled
Answers
B.
fw ctl get int vmac global param enabled; result of command should return value 1
B.
fw ctl get int vmac global param enabled; result of command should return value 1
Answers
C.
cphaprob-a if
C.
cphaprob-a if
Answers
D.
fw ctl get int fwha_vmac_global_param_enabled; result of command should return value 1
D.
fw ctl get int fwha_vmac_global_param_enabled; result of command should return value 1
Answers
Suggested answer: D

Explanation:

To ensure that VMAC mode is enabled, the CLI command that should be run on all cluster members isfw ctl get int fwha_vmac_global_param_enabled; result of command should return value 1. VMAC mode is a feature that allows ClusterXL to use virtual MAC addresses for cluster interfaces, instead of physical MAC addresses. This improves the failover performance and compatibility of ClusterXL with switches and routers. To check if VMAC mode is enabled, the command fw ctl get int fwha_vmac_global_param_enabled can be used, which returns 1 if VMAC mode is enabled, and 0 if VMAC mode is disabled.

For best practices, what is the recommended time for automatic unlocking of locked admin accounts?

A.
20 minutes
A.
20 minutes
Answers
B.
15 minutes
B.
15 minutes
Answers
C.
Admin account cannot be unlocked automatically
C.
Admin account cannot be unlocked automatically
Answers
D.
30 minutes at least
D.
30 minutes at least
Answers
Suggested answer: D

Explanation:

For best practices, the recommended time for automatic unlocking of locked admin accounts is30 minutes at least. Admin accounts can be locked due to failed login attempts, password expiration, or manual locking by another admin. To prevent unauthorized access or brute force attacks, locked admin accounts should not be unlocked automatically too soon. The recommended minimum time for automatic unlocking is 30 minutes, which can be configured from the SmartConsole under Manage > Permissions and Administrators > Advanced > Unlock locked administrators after.

Which is NOT a SmartEvent component?

A.
SmartEvent Server
A.
SmartEvent Server
Answers
B.
Correlation Unit
B.
Correlation Unit
Answers
C.
Log Consolidator
C.
Log Consolidator
Answers
D.
Log Server
D.
Log Server
Answers
Suggested answer: C

Explanation:

Log Consolidatoris NOT a SmartEvent component. SmartEvent is a unified security event management solution that provides visibility, analysis, and reporting of security events across multiple Check Point products. SmartEvent consists of three main components: SmartEvent Server, Correlation Unit, and Log Server. SmartEvent Server is responsible for storing and displaying security events in SmartConsole and SmartEventWeb. Correlation Unit is responsible for collecting and correlating logs from various sources and generating security events based on predefined or custom scenarios. Log Server is responsible for receiving and indexing logs from Security Gateways and other Check Point modules. Log Consolidator is not a valid component or blade of SmartEvent.

Check Point APIs allow system engineers and developers to make changes to their organization's security policy with CLI tools and Web Services for all the following except:

A.
Create new dashboards to manage 3rd party task
A.
Create new dashboards to manage 3rd party task
Answers
B.
Create products that use and enhance 3rd party solutions
B.
Create products that use and enhance 3rd party solutions
Answers
C.
Execute automated scripts to perform common tasks
C.
Execute automated scripts to perform common tasks
Answers
D.
Create products that use and enhance the Check Point Solution
D.
Create products that use and enhance the Check Point Solution
Answers
Suggested answer: A

Explanation:

Check Point APIs let system administrators and developers make changes to the security policy with CLI tools and web-services. You can use an API to:

* Use an automated script to perform common tasks

* Integrate Check Point products with 3rd party solutions

* Create products that use and enhance the Check Point solution

When SecureXL is enabled, all packets should be accelerated, except packets that match the following conditions:

A.
All UDP packets
A.
All UDP packets
Answers
B.
All IPv6 Traffic
B.
All IPv6 Traffic
Answers
C.
All packets that match a rule whose source or destination is the Outside Corporate Network
C.
All packets that match a rule whose source or destination is the Outside Corporate Network
Answers
D.
CIFS packets
D.
CIFS packets
Answers
Suggested answer: D

Explanation:

When SecureXL is enabled, all packets should be accelerated, except packets that match the following conditions:CIFS packets. SecureXL is a technology that accelerates network traffic processing by offloading intensive operations from the Firewall kernel to a dedicated SecureXL device. However, some packets cannot be accelerated by SecureXL due to various reasons, such as unsupported features, security policy settings, or protocol limitations. One example of packets that cannot be accelerated by SecureXL are CIFS packets, which are used for file sharing and access over SMB protocol. CIFS packets are not accelerated by SecureXL because they require stateful inspection by the Firewall kernel.

Total 626 questions
Go to page: of 63