ExamGecko
Home Home / Checkpoint / 156-315.81

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 28

Question list
Search
Search

Vanessa is a Firewall administrator. She wants to test a backup of her company's production Firewall cluster Dallas_GW. She has a lab environment that is identical to her production environment. She decided to restore production backup via SmartConsole in lab environment.

Which details she need to fill in System Restore window before she can click OK button and test the backup?

A.
Server, SCP, Username, Password, Path, Comment, Member
A.
Server, SCP, Username, Password, Path, Comment, Member
Answers
B.
Server, TFTP, Username, Password, Path, Comment, All Members
B.
Server, TFTP, Username, Password, Path, Comment, All Members
Answers
C.
Server, Protocol, Username, Password, Path, Comment, All Members
C.
Server, Protocol, Username, Password, Path, Comment, All Members
Answers
D.
Server, Protocol, username Password, Path, Comment, Member
D.
Server, Protocol, username Password, Path, Comment, Member
Answers
Suggested answer: C

Explanation:

According to the Check Point website, Vanessa needs to fill in the following details in the System Restore window before she can click OK button and test the backup: Server, Protocol, Username, Password, Path, Comment, All Members. These details specify the source and destination of the backup file, as well as the scope of the restore operation. The other options are either missing or incorrect details.

Reference: System Restore

What are the types of Software Containers?

A.
Three; security management, Security Gateway, and endpoint security
A.
Three; security management, Security Gateway, and endpoint security
Answers
B.
Three; Security Gateway, endpoint security, and gateway management
B.
Three; Security Gateway, endpoint security, and gateway management
Answers
C.
Two; security management and endpoint security
C.
Two; security management and endpoint security
Answers
D.
Two; endpoint security and Security Gateway
D.
Two; endpoint security and Security Gateway
Answers
Suggested answer: A

Explanation:

The Software Container is a logical component in the Software Blade Architecture. There are three types of Software Containers: Security Management, Security Gateway, and Endpoint Security. The container enables the server functionality, and defines its purpose -- e.g, management or gateway. https://downloads.checkpoint.com/dc/download.htm?ID=11608

Which of the following technologies extracts detailed information from packets and stores that information in state tables?

A.
INSPECT Engine
A.
INSPECT Engine
Answers
B.
Stateful Inspection
B.
Stateful Inspection
Answers
C.
Packet Filtering
C.
Packet Filtering
Answers
D.
Application Layer Firewall
D.
Application Layer Firewall
Answers
Suggested answer: A

Explanation:

According to the Check Point website, INSPECT Engine is the technology that extracts detailed information from packets and stores that information in state tables. INSPECT Engine is the core of Check Point's Stateful Inspection technology, which enables Security Gateways to inspect traffic at multiple layers and enforce security policies. The other technologies are either not related or not specific enough.

Reference: INSPECT Engine

Which tool provides a list of trusted files to the administrator so they can specify to the Threat Prevention blade that these files do not need to be scanned or analyzed?

A.
ThreatWiki
A.
ThreatWiki
Answers
B.
Whitelist Files
B.
Whitelist Files
Answers
C.
AppWiki
C.
AppWiki
Answers
D.
IPS Protections
D.
IPS Protections
Answers
Suggested answer: B

Explanation:

According to the Check Point website, Whitelist Files is the tool that provides a list of trusted files to the administrator so they can specify to the Threat Prevention blade that these files do not need to be scanned or analyzed. Whitelist Files can be configured in SmartConsole under Threat Prevention > Policy > Whitelist Files. The other tools are either not related or not valid tools.

Reference: Whitelist Files

Which Check Point software blade provides Application Security and identity control?

A.
Identity Awareness
A.
Identity Awareness
Answers
B.
Data Loss Prevention
B.
Data Loss Prevention
Answers
C.
URL Filtering
C.
URL Filtering
Answers
D.
Application Control
D.
Application Control
Answers
Suggested answer: D

Explanation:

Application Control is the software blade that provides Application Security and identity control. It allows administrators to define granular policies based on users or groups to identify, block or limit the usage of web applications and widgets. Application Control also integrates with Identity Awareness to provide user-level visibility and control.

Reference:Training & Certification | Check Point Software,Check Point Resource Library

What is UserCheck?

A.
Messaging tool used to verify a user's credentials.
A.
Messaging tool used to verify a user's credentials.
Answers
B.
Communication tool used to inform a user about a website or application they are trying to access.
B.
Communication tool used to inform a user about a website or application they are trying to access.
Answers
C.
Administrator tool used to monitor users on their network.
C.
Administrator tool used to monitor users on their network.
Answers
D.
Communication tool used to notify an administrator when a new user is created.
D.
Communication tool used to notify an administrator when a new user is created.
Answers
Suggested answer: B

Explanation:

UserCheck is a communication tool used to inform a user about a website or application they are trying to access. UserCheck allows administrators to interact with users in real time, informing them of the security policy and the actions they need to take. UserCheck can also enable users to self-remediate incidents or request exceptions from the administrator.

Reference:Training & Certification | Check Point Software,Check Point Resource Library

Which of the following is NOT an alert option?

A.
SNMP
A.
SNMP
Answers
B.
High alert
B.
High alert
Answers
C.
Mail
C.
Mail
Answers
D.
User defined alert
D.
User defined alert
Answers
Suggested answer: B

Explanation:

High alert is not an alert option in Check Point. Alert options are ways to notify the administrator or other parties when a security event occurs. The available alert options are SNMP, Mail, User defined alert, Log, Popup alert, and User alert.

Reference:Training & Certification | Check Point Software,Check Point Resource Library

What does it mean if Deyra sees the gateway status? (Choose the BEST answer.)

A.
SmartCenter Server cannot reach this Security Gateway.
A.
SmartCenter Server cannot reach this Security Gateway.
Answers
B.
There is a blade reporting a problem.
B.
There is a blade reporting a problem.
Answers
C.
VPN software blade is reporting a malfunction.
C.
VPN software blade is reporting a malfunction.
Answers
D.
Security Gateway's MGNT NIC card is disconnected.
D.
Security Gateway's MGNT NIC card is disconnected.
Answers
Suggested answer: B

Explanation:

If Deyra sees the gateway status as shown in the image, it means that there is a blade reporting a problem. The red exclamation mark indicates that one or more blades on the gateway have an issue that needs attention. The issue could be related to configuration, license, policy, or other factors. Deyra can hover over the icon to see more details about the problem.

Reference:Training & Certification | Check Point Software,New Courses and Certificates for R81.20 - Check Point CheckMates

When using the Mail Transfer Agent, where are the debug logs stored?

A.
$FWDIR/bin/emaild.mta. elg
A.
$FWDIR/bin/emaild.mta. elg
Answers
B.
$FWDIR/log/mtad elg
B.
$FWDIR/log/mtad elg
Answers
C.
/var/log/mail.mta elg
C.
/var/log/mail.mta elg
Answers
D.
$CPDIR/log/emaild elg
D.
$CPDIR/log/emaild elg
Answers
Suggested answer: C

Explanation:

When using the Mail Transfer Agent, the debug logs are stored in /var/log/mail.mta.elg. This file contains information about the email messages that are processed by the Mail Transfer Agent, such as sender, recipient, subject, size, action, etc. You can use the command mailq to view the current mail queue and the command maild -d to enable debug mode for the Mail Transfer Agent.

Reference: [Mail Transfer Agent]

UserCheck objects in the Application Control and URL Filtering rules allow the gateway to communicate with the users. Which action is not supported in UserCheck objects?

A.
Ask
A.
Ask
Answers
B.
Drop
B.
Drop
Answers
C.
Inform
C.
Inform
Answers
D.
Reject
D.
Reject
Answers
Suggested answer: D

Explanation:

The action that is not supported in UserCheck objects is Reject. UserCheck objects in the Application Control and URL Filtering rules allow the gateway to communicate with the users and display messages or requests on their browsers. The supported actions in UserCheck objects are Ask, Inform, Block, and Continue. The Ask action prompts the user to confirm or cancel an action. The Inform action notifies the user about an event or a policy. The Block action prevents the user from accessing a resource or performing an action. The Continue action allows the user to access a resource or perform an action after displaying a message.

Reference: [UserCheck]

Total 626 questions
Go to page: of 63