ExamGecko
Home Home / Checkpoint / 156-315.81

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 25

Question list
Search
Search

Which of the following is NOT an option to calculate the traffic direction?

A.
Incoming
A.
Incoming
Answers
B.
Internal
B.
Internal
Answers
C.
External
C.
External
Answers
D.
Outgoing
D.
Outgoing
Answers
Suggested answer: D

Explanation:

The option that is NOT an option to calculate the traffic direction isOutgoing. Traffic direction is a parameter that determines how traffic is classified as internal or external based on its source and destination. Traffic direction can be calculated using three options: Incoming, Internal, or External. Incoming means that traffic is classified as internal if its destination is one of the Security Gateway's interfaces, and external otherwise. Internal means that traffic is classified as internal if its source or destination belongs to one of the internal networks defined in the topology, and external otherwise. External means that traffic is classified as internal if both its source and destination belong to one of the internal networks defined in the topology, and external otherwise. Outgoing is not a valid option to calculate traffic direction.

What command lists all interfaces using Multi-Queue?

A.
cpmq get
A.
cpmq get
Answers
B.
show interface all
B.
show interface all
Answers
C.
cpmq set
C.
cpmq set
Answers
D.
show multiqueue all
D.
show multiqueue all
Answers
Suggested answer: A

Explanation:

The command that lists all interfaces using Multi-Queue iscpmq get. Multi-Queue is a feature that allows network interfaces to use multiple transmit and receive queues, which improves the performance and scalability of the Security Gateway by distributing the network load among several CPU cores. Cpmq is a command that allows administrators to configure and manage Multi-Queue settings on network interfaces. Cpmq get lists all interfaces using Multi-Queue and shows their queue count and core distribution.

When deploying SandBlast, how would a Threat Emulation appliance benefit from the integration of ThreatCloud?

A.
ThreatCloud is a database-related application which is located on-premise to preserve privacy of company-related data
A.
ThreatCloud is a database-related application which is located on-premise to preserve privacy of company-related data
Answers
B.
ThreatCloud is a collaboration platform for all the CheckPoint customers to form a virtual cloud consisting of a combination of all on-premise private cloud environments
B.
ThreatCloud is a collaboration platform for all the CheckPoint customers to form a virtual cloud consisting of a combination of all on-premise private cloud environments
Answers
C.
ThreatCloud is a collaboration platform for Check Point customers to benefit from VMWare ESXi infrastructure which supports the Threat Emulation Appliances as virtual machines in the EMC Cloud
C.
ThreatCloud is a collaboration platform for Check Point customers to benefit from VMWare ESXi infrastructure which supports the Threat Emulation Appliances as virtual machines in the EMC Cloud
Answers
D.
ThreatCloud is a collaboration platform for all the Check Point customers to share information about malicious and benign files that all of the customers can benefit from as it makes emulation of known files unnecessary
D.
ThreatCloud is a collaboration platform for all the Check Point customers to share information about malicious and benign files that all of the customers can benefit from as it makes emulation of known files unnecessary
Answers
Suggested answer: D

Explanation:

ThreatCloud is a collaboration platform for all the Check Point customers to share information about malicious and benign files that all of the customers can benefit from as it makes emulation of known files unnecessary. ThreatCloud is a cloud-based service that collects and analyzes threat intelligence from multiple sources, such as Check Point products, third-party vendors, open sources, and customers. ThreatCloud provides real-time updates and feeds to Check Point products, such as SandBlast, which is a solution that detects and prevents zero-day attacks by emulating files in a sandbox environment. By integrating with ThreatCloud, a Threat Emulation appliance can benefit from the shared information about malicious and benign files, and avoid emulating files that are already known to be safe or harmful. This can improve the performance and efficiency of the Threat Emulation appliance.The other options are either incorrect or not relevant to ThreatCloud or Threat Emulation.

During the Check Point Stateful Inspection Process, for packets that do not pass Firewall Kernel Inspection and are rejected by the rule definition, packets are:

A.
Dropped without sending a negative acknowledgment
A.
Dropped without sending a negative acknowledgment
Answers
B.
Dropped without logs and without sending a negative acknowledgment
B.
Dropped without logs and without sending a negative acknowledgment
Answers
C.
Dropped with negative acknowledgment
C.
Dropped with negative acknowledgment
Answers
D.
Dropped with logs and without sending a negative acknowledgment
D.
Dropped with logs and without sending a negative acknowledgment
Answers
Suggested answer: D

Explanation:

For packets that do not pass Firewall Kernel Inspection and are rejected by the rule definition, packets are dropped with logs and without sending a negative acknowledgment. Firewall Kernel Inspection is the process of applying security policies and rules to network traffic by the Firewall kernel module. If a packet does not match any rule or matches a rule with an action of Drop or Reject, the packet is dropped by the Firewall kernel module. The difference between Drop and Reject is that Drop silently discards the packet without informing the sender, while Reject discards the packet and sends a negative acknowledgment (such as an ICMP message) to the sender. However, both Drop and Reject actions generate logs that record the details of the dropped packets, such as source, destination, protocol, port, rule number, etc. The other options are either incorrect or describe different scenarios.

Vanessa is firewall administrator in her company. Her company is using Check Point firewall on a central and several remote locations which are managed centrally by R77.30 Security Management Server. On central location is installed R77.30 Gateway on Open server. Remote locations are using Check Point UTM-1570 series appliances with R75.30 and some of them are using a UTM-1-Edge-X or Edge-W with latest available firmware. She is in process of migrating to R81.

What can cause Vanessa unnecessary problems, if she didn't check all requirements for migration to R81?

A.
Missing an installed R77.20 Add-on on Security Management Server
A.
Missing an installed R77.20 Add-on on Security Management Server
Answers
B.
Unsupported firmware on UTM-1 Edge-W appliance
B.
Unsupported firmware on UTM-1 Edge-W appliance
Answers
C.
Unsupported version on UTM-1 570 series appliance
C.
Unsupported version on UTM-1 570 series appliance
Answers
D.
Unsupported appliances on remote locations
D.
Unsupported appliances on remote locations
Answers
Suggested answer: A

Explanation:

What can cause Vanessa unnecessary problems, if she didn't check all requirements for migration to R81, is missing an installed R77.20 Add-on on Security Management Server. R77.20 Add-on is a package that adds new features and enhancements to R77 Security Management Server, such as support for new appliances, Gaia OS features, VPN features, etc. One of the requirements for migrating to R81 from R77 Security Management Server is to have R77.20 Add-on installed on the server. If Vanessa did not check this requirement and tried to migrate without R77.20 Add-on, she would encounter errors and failures during the migration process. The other options are either not relevant or not problematic for migration to R81.

Please choose the path to monitor the compliance status of the Check Point R81.20 based management.

A.
Gateways & Servers --> Compliance View
A.
Gateways & Servers --> Compliance View
Answers
B.
Compliance blade not available under R81.20
B.
Compliance blade not available under R81.20
Answers
C.
Logs & Monitor --> New Tab --> Open compliance View
C.
Logs & Monitor --> New Tab --> Open compliance View
Answers
D.
Security & Policies --> New Tab --> Compliance View
D.
Security & Policies --> New Tab --> Compliance View
Answers
Suggested answer: C

Explanation:

The path to monitor the compliance status of the Check Point R81.20 based management is Logs & Monitor > New Tab > Open compliance View. Compliance View is a feature that allows administrators to monitor and assess the compliance level of their Check Point products and security policies based on best practices and industry standards. Compliance View provides a dashboard that shows the overall compliance status, compliance score, compliance trends, compliance issues, compliance reports, and compliance blades for different security aspects, such as data protection, threat prevention, identity awareness, etc. To access Compliance View in R81.20 SmartConsole, administrators need to go to Logs & Monitor > New Tab > Open compliance View. The other options are either incorrect or not available in R81.20.

When using CPSTAT, what is the default port used by the AMON server?

A.
18191
A.
18191
Answers
B.
18192
B.
18192
Answers
C.
18194
C.
18194
Answers
D.
18190
D.
18190
Answers
Suggested answer: B

Explanation:

The default port used by the AMON server when using CPSTAT is 18192. CPSTAT is a command-line tool that allows administrators to monitor various statistics and status information about Check Point products and components, such as CPU usage, memory usage, policy installation, cluster state, etc. CPSTAT uses AMON (Advanced Monitoring) protocol to communicate with AMON server, which is a daemon that runs on Security Gateways or Management Servers and collects and provides AMON data. By default, AMON server listens on TCP port 18192 for incoming CPSTAT requests.

What must you do first if ''fwm sic_reset'' could not be completed?

A.
Cpstop then find keyword ''certificate'' in objects_5_0.C and delete the section
A.
Cpstop then find keyword ''certificate'' in objects_5_0.C and delete the section
Answers
B.
Reinitialize SIC on the security gateway then run ''fw unloadlocal''
B.
Reinitialize SIC on the security gateway then run ''fw unloadlocal''
Answers
C.
Reset SIC from Smart Dashboard
C.
Reset SIC from Smart Dashboard
Answers
D.
Change internal CA via cpconfig
D.
Change internal CA via cpconfig
Answers
Suggested answer: D

Explanation:

The first thing that must be done if ''fwm sic_reset'' could not be completed is to change internal CA via cpconfig. Fwm sic_reset is a command that allows administrators to reset Secure Internal Communication (SIC) between Security Management Server and Security Gateways or other Check Point modules. SIC is a mechanism that ensures secure and authenticated communication between Check Point components by using certificates issued by an internal Certificate Authority (ICA). If fwm sic_reset fails, it means that there is a problem with the ICA or the certificates that prevents SIC from being reset. To resolve this problem, administrators need to change internal CA via cpconfig, which is a command that allows administrators to configure various settings on Security Gateways or Management Servers, including the ICA. Changing internal CA via cpconfig will create a new ICA with a new certificate, and allow SIC to be reset with the new certificate.

Check Point security components are divided into the following components:

A.
GUI Client, Security Gateway, WebUI Interface
A.
GUI Client, Security Gateway, WebUI Interface
Answers
B.
GUI Client, Security Management, Security Gateway
B.
GUI Client, Security Management, Security Gateway
Answers
C.
Security Gateway, WebUI Interface, Consolidated Security Logs
C.
Security Gateway, WebUI Interface, Consolidated Security Logs
Answers
D.
Security Management, Security Gateway, Consolidate Security Logs
D.
Security Management, Security Gateway, Consolidate Security Logs
Answers
Suggested answer: B

Explanation:

Check Point security components are divided into the following components: GUI Client, Security Management, Security Gateway. GUI Client is the graphical user interface that allows administrators to configure, manage, and monitor Check Point products and security policies. Security Management is the server that stores and enforces the security policies and provides logging and reporting functions.Security Gateway is the device that inspects and filters network traffic according to the security policies.

You have a Geo-Protection policy blocking Australia and a number of other countries. Your network now requires a Check Point Firewall to be installed in Sydney, Australia.

What must you do to get SIC to work?

A.
Remove Geo-Protection, as the IP-to-country database is updated externally, and you have no control of this.
A.
Remove Geo-Protection, as the IP-to-country database is updated externally, and you have no control of this.
Answers
B.
Create a rule at the top in the Sydney firewall to allow control traffic from your network
B.
Create a rule at the top in the Sydney firewall to allow control traffic from your network
Answers
C.
Nothing - Check Point control connections function regardless of Geo-Protection policy
C.
Nothing - Check Point control connections function regardless of Geo-Protection policy
Answers
D.
Create a rule at the top in your Check Point firewall to bypass the Geo-Protection
D.
Create a rule at the top in your Check Point firewall to bypass the Geo-Protection
Answers
Suggested answer: C

Explanation:

Nothing needs to be done to get SIC to work if there is a Geo-Protection policy blocking Australia and a network requires a Check Point Firewall to be installed in Sydney, Australia. SIC stands for Secure Internal Communication, and it is a mechanism that ensures secure and authenticated communication between Check Point components by using certificates issued by an internal Certificate Authority (ICA). SIC is not affected by Geo-Protection policy, which is a feature that allows administrators to block or allow traffic based on the geographic location of the source or destination IP address.Geo-Protection policy only applies to data traffic, not control traffic, and SIC uses control traffic to establish trust between Check Point components.

Total 626 questions
Go to page: of 63