ExamGecko
Home Home / Checkpoint / 156-315.81

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 24

Question list
Search
Search

On what port does the CPM process run?

A.
TCP 857
A.
TCP 857
Answers
B.
TCP 18192
B.
TCP 18192
Answers
C.
TCP 900
C.
TCP 900
Answers
D.
TCP 19009
D.
TCP 19009
Answers
Suggested answer: D

Explanation:

The port that the CPM process runs on isTCP 19009. CPM stands for Check Point Management, and it is the main process that runs on the Security Management Server and interacts with SmartConsole clients. CPM is responsible for managing policies, objects, logs, tasks, and other management functions. CPM listens on TCP port 19009 for incoming connections from SmartConsole clients.The other ports are either used by other processes or not related to CPM.

What is the SandBlast Agent designed to do?

A.
Performs OS-level sandboxing for SandBlast Cloud architecture
A.
Performs OS-level sandboxing for SandBlast Cloud architecture
Answers
B.
Ensure the Check Point SandBlast services is running on the end user's system
B.
Ensure the Check Point SandBlast services is running on the end user's system
Answers
C.
If malware enters an end user's system, the SandBlast Agent prevents the malware from spreading with the network
C.
If malware enters an end user's system, the SandBlast Agent prevents the malware from spreading with the network
Answers
D.
Clean up email sent with malicious attachments
D.
Clean up email sent with malicious attachments
Answers
Suggested answer: C

Explanation:

The SandBlast Agent is designed toprevent malware from spreading within the networkif it enters an end user's system. SandBlast Agent is a lightweight endpoint security solution that protects devices from advanced threats such as ransomware, phishing, zero-day attacks, and data exfiltration. SandBlast Agent uses various technologies such as behavioral analysis, anti-exploitation, anti-ransomware, threat emulation, threat extraction, and forensics to detect and block malware before it can harm the device or the network.The other options are either not the main purpose or not the functionality of SandBlast Agent.

What is correct statement about Security Gateway and Security Management Server failover in Check Point R81.X in terms of Check Point Redundancy driven solution?

A.
Security Gateway failover is an automatic procedure but Security Management Server failover is a manual procedure.
A.
Security Gateway failover is an automatic procedure but Security Management Server failover is a manual procedure.
Answers
B.
Security Gateway failover as well as Security Management Server failover is a manual procedure.
B.
Security Gateway failover as well as Security Management Server failover is a manual procedure.
Answers
C.
Security Gateway failover is a manual procedure but Security Management Server failover is an automatic procedure.
C.
Security Gateway failover is a manual procedure but Security Management Server failover is an automatic procedure.
Answers
D.
Security Gateway failover as well as Security Management Server failover is an automatic procedure.
D.
Security Gateway failover as well as Security Management Server failover is an automatic procedure.
Answers
Suggested answer: A

Explanation:

The correct statement about Security Gateway and Security Management Server failover in Check Point R81.X in terms of Check Point Redundancy driven solution is:Security Gateway failover is an automatic procedure but Security Management Server failover is a manual procedure. Security Gateway failover is a feature that allows a cluster of Security Gateways to provide high availability and load balancing for network traffic. If one Security Gateway fails or becomes unreachable, another Security Gateway in the cluster automatically takes over its role and handles the traffic without interrupting the service. Security Management Server failover is a feature that allows a backup Security Management Server to take over the role of the primary Security Management Server in case of failure or disaster. However, this feature requires manual intervention to activate the backup server and restore the database from a backup file.

SandBlast agent extends 0 day prevention to what part of the network?

A.
Web Browsers and user devices
A.
Web Browsers and user devices
Answers
B.
DMZ server
B.
DMZ server
Answers
C.
Cloud
C.
Cloud
Answers
D.
Email servers
D.
Email servers
Answers
Suggested answer: A

Explanation:

SandBlast agent extends zero-day prevention toweb browsers and user devices. Zero-day prevention is a capability that protects devices from unknown and emerging threats that exploit vulnerabilities that have not been patched or disclosed. SandBlast Agent provides zero-day prevention by using various technologies such as threat emulation, threat extraction, anti-exploitation, anti-ransomware, and behavioral analysis. SandBlast Agent protects web browsers and user devices from malicious downloads, phishing links, drive-by downloads, browser exploits, malicious scripts, and more.

What command would show the API server status?

A.
cpm status
A.
cpm status
Answers
B.
api restart
B.
api restart
Answers
C.
api status
C.
api status
Answers
D.
show api status
D.
show api status
Answers
Suggested answer: C

Explanation:

The command that would show the API server status isapi status. API stands for Application Programming Interface, and it is a web service that allows external applications to interact with the Check Point management server using standard methods such as HTTP(S) requests and JSON objects. API status is a command that shows the current status of the API server, such as whether it is enabled or disabled, running or stopped, listening on which port, using which certificate, etc. The other commands are either invalid or perform different functions.

In Logging and Monitoring, the tracking options are Log, Detailed Log and Extended Log. Which of the following options can you add to each Log, Detailed Log and Extended Log?

A.
Accounting
A.
Accounting
Answers
B.
Suppression
B.
Suppression
Answers
C.
Accounting/Suppression
C.
Accounting/Suppression
Answers
D.
Accounting/Extended
D.
Accounting/Extended
Answers
Suggested answer: C

Explanation:

In Logging and Monitoring, the tracking options are Log, Detailed Log and Extended Log. The option that can be added to each Log, Detailed Log and Extended Log isAccounting/Suppression. Accounting/Suppression is a feature that allows administrators to control how often logs are generated for certain rules or connections. Accounting means that logs are generated periodically based on a specified interval or volume. Suppression means that logs are generated only for the first and last packet of a connection or session. Accounting/Suppression can be added to any tracking option to reduce the number of logs and save disk space.

Which file contains the host address to be published, the MAC address that needs to be associated with the IP Address, and the unique IP of the interface that responds to ARP request?

A.
/opt/CPshrd-R81/conf/local.arp
A.
/opt/CPshrd-R81/conf/local.arp
Answers
B.
/var/opt/CPshrd-R81/conf/local.arp
B.
/var/opt/CPshrd-R81/conf/local.arp
Answers
C.
$CPDIR/conf/local.arp
C.
$CPDIR/conf/local.arp
Answers
D.
$FWDIR/conf/local.arp
D.
$FWDIR/conf/local.arp
Answers
Suggested answer: D

Explanation:

The file that contains the host address to be published, the MAC address that needs to be associated with the IP address, and the unique IP of the interface that responds to ARP request is$FWDIR/conf/local.arp. Local.arp is a configuration file that defines static ARP entries for hosts behind NAT devices. This file allows the Security Gateway to respond to ARP requests for NATed hosts with the correct MAC address, and to publish the NATed IP address instead of the real IP address.The other files are either not related or not valid.

With SecureXL enabled, accelerated packets will pass through the following:

A.
Network Interface Card, OSI Network Layer, OS IP Stack, and the Acceleration Device
A.
Network Interface Card, OSI Network Layer, OS IP Stack, and the Acceleration Device
Answers
B.
Network Interface Card, Check Point Firewall Kernal, and the Acceleration Device
B.
Network Interface Card, Check Point Firewall Kernal, and the Acceleration Device
Answers
C.
Network Interface Card and the Acceleration Device
C.
Network Interface Card and the Acceleration Device
Answers
D.
Network Interface Card, OSI Network Layer, and the Acceleration Device
D.
Network Interface Card, OSI Network Layer, and the Acceleration Device
Answers
Suggested answer: C

Explanation:

With SecureXL enabled, accelerated packets will pass through the following:Network Interface Card and the Acceleration Device. SecureXL is a technology that accelerates network traffic processing by offloading intensive operations from the Firewall kernel to a dedicated SecureXL device. Accelerated packets are packets that match certain criteria and can be handled by SecureXL without involving the Firewall kernel. These packets bypass the OSI Network Layer, OS IP Stack, and Check Point Firewall Kernel, and are processed directly by the Network Interface Card and the Acceleration Device.The other options are either incorrect or describe non-accelerated packets.

Which command would you use to set the network interfaces' affinity in Manual mode?

A.
sim affinity -m
A.
sim affinity -m
Answers
B.
sim affinity -l
B.
sim affinity -l
Answers
C.
sim affinity -a
C.
sim affinity -a
Answers
D.
sim affinity -s
D.
sim affinity -s
Answers
Suggested answer: D

Explanation:

The command that would be used to set the network interfaces' affinity in Manual mode issim affinity -s. Sim affinity is a command that allows administrators to view and modify the CPU core affinity of network interfaces and SecureXL instances. Core affinity is a feature that binds network interfaces and SecureXL instances to specific CPU cores, which improves the performance and load balancing of the Security Gateway. Sim affinity -s sets the network interfaces' affinity in Manual mode, which means that administrators can manually assign network interfaces to CPU cores. The other options are either invalid or perform different functions.

You notice that your firewall is under a DDoS attack and would like to enable the Penalty Box feature, which command you use?

A.
sim erdos --e 1
A.
sim erdos --e 1
Answers
B.
sim erdos -- m 1
B.
sim erdos -- m 1
Answers
C.
sim erdos --v 1
C.
sim erdos --v 1
Answers
D.
sim erdos --x 1
D.
sim erdos --x 1
Answers
Suggested answer: A

Explanation:

The command that would be used to enable the Penalty Box feature issim erdos -e 1. Penalty Box is a feature that protects the Security Gateway from DDoS attacks by dropping packets from sources that send excessive traffic. Sim erdos is a command that allows administrators to configure and manage the Penalty Box feature. Sim erdos -e 1 enables the Penalty Box feature on the Security Gateway. The other options are either invalid or perform different functions.

Total 626 questions
Go to page: of 63