ExamGecko
Home Home / Checkpoint / 156-315.81

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 29

Question list
Search
Search

Firewall polices must be configured to accept VRRP packets on the GAiA platform if it Firewall software. The Multicast destination assigned by the internet Assigned Number Authority (IANA) for VRRP is:

A.
224.0.0.18
A.
224.0.0.18
Answers
B.
224 00 5
B.
224 00 5
Answers
C.
224.0.0.102
C.
224.0.0.102
Answers
D.
224.0.0.22
D.
224.0.0.22
Answers
Suggested answer: A

Explanation:

The multicast destination assigned by the Internet Assigned Numbers Authority (IANA) for VRRP is 224.0.0.18. This is a reserved multicast address that is used by VRRP routers to communicate with each other and announce their priority and state. Firewall policies must be configured to accept VRRP packets on the Gaia platform if it runs Firewall software. Otherwise, VRRP packets will be dropped by default.

Reference: [Configuring VRRP on Gaia]

Which of the following is NOT a valid type of SecureXL template?

A.
Accept Template
A.
Accept Template
Answers
B.
Deny template
B.
Deny template
Answers
C.
Drop Template
C.
Drop Template
Answers
D.
NAT Template
D.
NAT Template
Answers
Suggested answer: B

Explanation:

The type of SecureXL template that is not valid among the options is Deny template. SecureXL templates are pre-allocated data structures that store information about connections that match certain criteria. They are used to accelerate the processing of packets that belong to those connections. The valid types of SecureXL templates are Accept, Drop, NAT, and Crypt. The Accept template is used for connections that are allowed by the Firewall policy. The Drop template is used for connections that are blocked by the Firewall policy. The NAT template is used for connections that require Network Address Translation. The Crypt template is used for connections that require encryption or decryption.

Reference: [SecureXL Templates]

Aaron is a Syber Security Engineer working for Global Law Firm with large scale deployment of Check Point Enterprise Appliances running GAiA R81.X The Network Security Developer Team is having an issue testing the API with a newly deployed R81.X Security Management Server Aaron wants to confirm API services are working properly. What should he do first?

A.
Aaron should check API Server status with 'fwm api status' from Expert mode If services are stopped, he should start them with 'fwm api start'.
A.
Aaron should check API Server status with 'fwm api status' from Expert mode If services are stopped, he should start them with 'fwm api start'.
Answers
B.
Aaron should check API Server status with 'cpapi status' from Expert mode. If services are stopped, he should start them with 'cpapi start'
B.
Aaron should check API Server status with 'cpapi status' from Expert mode. If services are stopped, he should start them with 'cpapi start'
Answers
C.
Aaron should check API Server status with 'api status' from Expert mode If services are stopped, he should start them with 'api start'
C.
Aaron should check API Server status with 'api status' from Expert mode If services are stopped, he should start them with 'api start'
Answers
D.
Aaron should check API Server status with 'cpm api status' from Expert mode. If services are stopped, he should start them with 'cpi api start'.
D.
Aaron should check API Server status with 'cpm api status' from Expert mode. If services are stopped, he should start them with 'cpi api start'.
Answers
Suggested answer: C

Explanation:

Aaron should check API Server status with ''api status'' from Expert mode. If services are stopped, he should start them with ''api start''. This is the correct way to verify and start the API Server on a Security Management Server running Gaia R81.X. The other commands are either invalid or not related to the API Server. The api command is a wrapper script that simplifies the management of the API Server. It can be used to start, stop, restart, status, enable, or disable the API Server.

Reference: [API Server]

What state is the Management HA in when both members have different policies/databases?

A.
Synchronized
A.
Synchronized
Answers
B.
Never been synchronized
B.
Never been synchronized
Answers
C.
Lagging
C.
Lagging
Answers
D.
Collision
D.
Collision
Answers
Suggested answer: D

Explanation:

The state of the Management HA when both members have different policies/databases is Collision. This state indicates that there is a conflict between the members and they need to be synchronized manually. The other states are not applicable in this scenario. The Synchronized state indicates that both members have identical policies/databases and are ready for failover. The Never been synchronized state indicates that the members have never been synchronized since they were configured as HA pair. The Lagging state indicates that one member has a newer policy/database than the other member and needs to be synchronized automatically.

Reference: [Management High Availability]

https://sc1.checkpoint.com/documents/R77/CP_R77_SecurityManagement_WebAdminGuide/

html_frameset.htm?topic=documents/R77/CP_R77_SecurityManagement_WebAdminGuide/98838

After verifying that API Server is not running, how can you start the API Server?

A.
Run command 'set api start' in CLISH mode
A.
Run command 'set api start' in CLISH mode
Answers
B.
Run command 'mgmt__cli set api start' in Expert mode
B.
Run command 'mgmt__cli set api start' in Expert mode
Answers
C.
Run command 'mgmt api start' in CLISH mode
C.
Run command 'mgmt api start' in CLISH mode
Answers
D.
Run command 'api start' in Expert mode
D.
Run command 'api start' in Expert mode
Answers
Suggested answer: D

Explanation:

After verifying that API Server is not running, you can start the API Server by running the command ''api start'' in Expert mode. This command will start the API Server process (cpm_api) and enable it to run automatically after reboot. You can also use the command ''api enable'' to enable the API Server without starting it immediately. The other commands are either incorrect or not related to the API Server. The set api command is used in CLISH mode to configure API settings, such as port, domain, or certificate. The mgmt_cli command is used in Expert mode to execute API commands, such as login, logout, show, set, etc.

Reference: [API Server]

How many layers make up the TCP/IP model?

A.
2
A.
2
Answers
B.
7
B.
7
Answers
C.
6
C.
6
Answers
D.
4
D.
4
Answers
Suggested answer: D

Explanation:

The TCP/IP model is a four-layer model that describes how data is transmitted over a network. The four layers are: Application, Transport, Internet, and Network Access. The Application layer provides services and protocols for applications to communicate with each other. The Transport layer provides reliable or unreliable data delivery between hosts. The Internet layer provides routing and addressing of packets across networks. The Network Access layer provides physical and logical access to the network media.

Reference:Training & Certification | Check Point Software,Check Point Resource Library

What is the Implicit Clean-up Rule?

A.
A setting is defined in the Global Properties for all policies.
A.
A setting is defined in the Global Properties for all policies.
Answers
B.
A setting that is configured per Policy Layer.
B.
A setting that is configured per Policy Layer.
Answers
C.
Another name for the Clean-up Rule.
C.
Another name for the Clean-up Rule.
Answers
D.
Automatically created when the Clean-up Rule is defined.
D.
Automatically created when the Clean-up Rule is defined.
Answers
Suggested answer: C

Explanation:

The Implicit Clean-up Rule is another name for the Clean-up Rule, which is the last rule in every policy layer. The Clean-up Rule defines the default action for traffic that does not match any of the preceding rules in the layer. The default action is to drop the traffic and log it, but it can be changed by the administrator.

Reference:Training & Certification | Check Point Software,Check Point Resource Library

Ken wants to obtain a configuration lock from other administrator on R81 Security Management Server. He can do this via WebUI or via CLI.

Which command should he use in CLI? (Choose the correct answer.)

A.
remove database lock
A.
remove database lock
Answers
B.
The database feature has one command lock database override.
B.
The database feature has one command lock database override.
Answers
C.
override database lock
C.
override database lock
Answers
D.
The database feature has two commands lock database override and unlock database. Both will work.
D.
The database feature has two commands lock database override and unlock database. Both will work.
Answers
Suggested answer: D

Explanation:

Ken can use either of the two commands lock database override or unlock database to obtain a configuration lock from another administrator on R81 Security Management Server via CLI. These commands allow him to override the existing lock and gain exclusive access to the database. He can also use the WebUI to perform the same action.

Reference:Training & Certification | Check Point Software,New Courses and Certificates for R81.20 - Check Point CheckMates

What will be the effect of running the following command on the Security Management Server?

A.
Remove the installed Security Policy.
A.
Remove the installed Security Policy.
Answers
B.
Remove the local ACL lists.
B.
Remove the local ACL lists.
Answers
C.
No effect.
C.
No effect.
Answers
D.
Reset SIC on all gateways.
D.
Reset SIC on all gateways.
Answers
Suggested answer: A

Explanation:

Running the command fw unloadlocal on the Security Management Server will remove the installed Security Policy from the local firewall module. This command is useful for troubleshooting purposes when there is a problem with the policy installation or enforcement. However, it will also expose the Security Management Server to potential attacks, so it should be used with caution.

Reference:Training & Certification | Check Point Software, R81 CCSA & CCSE exams released featuring Promo for... - Check Point ...

Which of the following is NOT a VPN routing option available in a star community?

A.
To satellites through center only.
A.
To satellites through center only.
Answers
B.
To center, or through the center to other satellites, to Internet and other VPN targets.
B.
To center, or through the center to other satellites, to Internet and other VPN targets.
Answers
C.
To center and to other satellites through center.
C.
To center and to other satellites through center.
Answers
D.
To center only.
D.
To center only.
Answers
Suggested answer: A, D

Explanation:

A star community is a VPN topology where one or more satellites connect to a center gateway. The center gateway can be a Security Gateway or a Security Management Server. The VPN routing option determines how the traffic is routed between the satellites and the center, and between the satellites themselves.There are three VPN routing options available in a star community12:

To center only: The satellites can only communicate with the center gateway, and not with each other or with any other VPN targets. This option is useful for remote access clients that only need to access resources on the center gateway.

To center, or through the center to other satellites, to Internet and other VPN targets: The satellites can communicate with the center gateway, and also with other satellites, Internet hosts, and other VPN targets through the center gateway. This option is useful for branch offices that need to access resources on the center gateway, as well as on other branch offices, Internet hosts, and other VPN targets.

To center and to other satellites through center: The satellites can communicate with the center gateway, and also with other satellites through the center gateway. However, they cannot communicate with Internet hosts or other VPN targets. This option is useful for branch offices that need to access resources on the center gateway and on other branch offices, but not on Internet hosts or other VPN targets.

Therefore, the options A (To satellites through center only) and D (To center only) are not valid VPN routing options in a star community.

Total 626 questions
Go to page: of 63