ExamGecko
Home Home / Checkpoint / 156-315.81

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 3

Question list
Search
Search

What is the correct command to observe the Sync traffic in a VRRP environment?

A.
fw monitor --e ''accept[12:4,b]=224.0.0.18;''
A.
fw monitor --e ''accept[12:4,b]=224.0.0.18;''
Answers
B.
fw monitor --e ''accept port(6118;''
B.
fw monitor --e ''accept port(6118;''
Answers
C.
fw monitor --e ''accept proto=mcVRRP;''
C.
fw monitor --e ''accept proto=mcVRRP;''
Answers
D.
fw monitor --e ''accept dst=224.0.0.18;''
D.
fw monitor --e ''accept dst=224.0.0.18;''
Answers
Suggested answer: D

Explanation:

The correct command to observe the Sync traffic in a VRRP environment isfw monitor --e ''accept dst=224.0.0.18;''. This command captures the packets that have the destination IP address of 224.0.0.18, which is the multicast address used by VRRP for synchronization. The other commands are either not valid or not specific to VRRP Sync traffic.

Reference: [Check Point R81 ClusterXL Administration Guide], Check Point R81 Performance Tuning Administration Guide

What has to be taken into consideration when configuring Management HA?

A.
The Database revisions will not be synchronized between the management servers
A.
The Database revisions will not be synchronized between the management servers
Answers
B.
SmartConsole must be closed prior to synchronized changes in the objects database
B.
SmartConsole must be closed prior to synchronized changes in the objects database
Answers
C.
If you wanted to use Full Connectivity Upgrade, you must change the Implied Rules to allow FW1_cpredundant to pass before the Firewall Control Connections.
C.
If you wanted to use Full Connectivity Upgrade, you must change the Implied Rules to allow FW1_cpredundant to pass before the Firewall Control Connections.
Answers
D.
For Management Server synchronization, only External Virtual Switches are supported. So, if you wanted to employ Virtual Routers instead, you have to reconsider your design.
D.
For Management Server synchronization, only External Virtual Switches are supported. So, if you wanted to employ Virtual Routers instead, you have to reconsider your design.
Answers
Suggested answer: A

Explanation:

When configuring Management HA, you have to take into consideration that the Database revisions will not be synchronized between the management servers. Database revisions are snapshots of the database that are created manually or automatically when installing a policy or saving changes. They are stored locally on each management server and are not replicated by Management HA. The other options are either not true or not relevant to Management HA.

Reference:Check Point R81 Installation and Upgrade Guide

Which Mobile Access Application allows a secure container on Mobile devices to give users access to internal website, file share and emails?

A.
Check Point Remote User
A.
Check Point Remote User
Answers
B.
Check Point Capsule Workspace
B.
Check Point Capsule Workspace
Answers
C.
Check Point Mobile Web Portal
C.
Check Point Mobile Web Portal
Answers
D.
Check Point Capsule Remote
D.
Check Point Capsule Remote
Answers
Suggested answer: C

Explanation:

Check Point Mobile Web Portal is a Mobile Access Application that allows a secure container on mobile devices to give users access to internal websites, file shares and emails. The Mobile Web Portal is a web-based application that can be accessed from any browser on any device. It provides a user-friendly interface to access various resources on the corporate network without requiring a VPN client or additional software installation. The Mobile Web Portal supports authentication methods such as user name and password, certificate, one-time password (OTP), etc. The Mobile Web Portal also supports security features such as encryption, data leakage prevention (DLP), threat prevention, etc.

Reference:R81 Mobile Access Administration Guide

Which of the following process pulls application monitoring status?

A.
fwd
A.
fwd
Answers
B.
fwm
B.
fwm
Answers
C.
cpwd
C.
cpwd
Answers
D.
cpd
D.
cpd
Answers
Suggested answer: D

Explanation:

The process that pulls application monitoring status iscpd. cpd is a daemon that runs on Check Point products and performs various tasks related to management communication, policy installation, license verification, logging, etc. cpd also monitors the status of other processes and applications on the system and reports it to the management server. cpd uses SNMP to collect information from various sources, such as blades, gateways, servers, etc. You can view the application monitoring status in SmartConsole by using theGateways & Serverstab in theLogs & Monitorview.

Reference: Check Point Processes and Daemons

Identify the API that is not supported by Check Point currently.

A.
R81 Management API-
A.
R81 Management API-
Answers
B.
Identity Awareness Web Services API
B.
Identity Awareness Web Services API
Answers
C.
Open REST API
C.
Open REST API
Answers
D.
OPSEC SDK
D.
OPSEC SDK
Answers
Suggested answer: C

Explanation:

Check Point currently supports four types of APIs: R81 Management API, Identity Awareness Web Services API, OPSEC SDK, and Gaia REST API. The Open REST API is not a valid option.Reference:Check Point APIs

SandBlast Mobile identifies threats in mobile devices by using on-device, network, and cloud-based algorithms and has four dedicated components that constantly work together to protect mobile devices and their data. Which component is NOT part of the SandBlast Mobile solution?

A.
Management Dashboard
A.
Management Dashboard
Answers
B.
Gateway
B.
Gateway
Answers
C.
Personal User Storage
C.
Personal User Storage
Answers
D.
Behavior Risk Engine
D.
Behavior Risk Engine
Answers
Suggested answer: C

Explanation:

SandBlast Mobile has four components: Management Dashboard, Gateway, Behavior Risk Engine, and On-Device Network Protection. Personal User Storage is not part of the SandBlast Mobile solution.Reference:SandBlast Mobile Architecture

What are the different command sources that allow you to communicate with the API server?

A.
SmartView Monitor, API_cli Tool, Gaia CLI, Web Services
A.
SmartView Monitor, API_cli Tool, Gaia CLI, Web Services
Answers
B.
SmartConsole GUI Console, mgmt_cli Tool, Gaia CLI, Web Services
B.
SmartConsole GUI Console, mgmt_cli Tool, Gaia CLI, Web Services
Answers
C.
SmartConsole GUI Console, API_cli Tool, Gaia CLI, Web Services
C.
SmartConsole GUI Console, API_cli Tool, Gaia CLI, Web Services
Answers
D.
API_cli Tool, Gaia CLI, Web Services
D.
API_cli Tool, Gaia CLI, Web Services
Answers
Suggested answer: B

Explanation:

You can communicate with the API server using three command sources: SmartConsole GUI Console, mgmt_cli Tool, and Gaia CLI. Web Services are not a command source, but a way to access the API server using HTTP requests.Reference:Check Point Management APIs

What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?

A.
Anti-Bot is the only countermeasure against unknown malware
A.
Anti-Bot is the only countermeasure against unknown malware
Answers
B.
Anti-Bot is the only protection mechanism which starts a counter-attack against known Command & Control Centers
B.
Anti-Bot is the only protection mechanism which starts a counter-attack against known Command & Control Centers
Answers
C.
Anti-Bot is the only signature-based method of malware protection.
C.
Anti-Bot is the only signature-based method of malware protection.
Answers
D.
Anti-Bot is a post-infection malware protection to prevent a host from establishing a connection to a Command & Control Center.
D.
Anti-Bot is a post-infection malware protection to prevent a host from establishing a connection to a Command & Control Center.
Answers
Suggested answer: D

Explanation:

Anti-Bot is a post-infection malware protection that detects and blocks botnet communications from infected hosts to Command & Control servers. It is different from other Threat Prevention mechanisms that prevent malware from entering the network or executing on the hosts.Reference:Anti-Bot Software Blade

Which TCP-port does CPM process listen to?

A.
18191
A.
18191
Answers
B.
18190
B.
18190
Answers
C.
8983
C.
8983
Answers
D.
19009
D.
19009
Answers
Suggested answer: D

Explanation:

The CPM process is the core process of the Security Management Server that handles all management operations. It listens to TCP-port 19009 by default.Reference:CPM process

Which method below is NOT one of the ways to communicate using the Management API's?

A.
Typing API commands using the ''mgmt_cli'' command
A.
Typing API commands using the ''mgmt_cli'' command
Answers
B.
Typing API commands from a dialog box inside the SmartConsole GUI application
B.
Typing API commands from a dialog box inside the SmartConsole GUI application
Answers
C.
Typing API commands using Gaia's secure shell(clish)19+
C.
Typing API commands using Gaia's secure shell(clish)19+
Answers
D.
Sending API commands over an http connection using web-services
D.
Sending API commands over an http connection using web-services
Answers
Suggested answer: D

Explanation:

The Management API supports three methods of communication: mgmt_cli command, SmartConsole GUI dialog box, and Gaia CLI. Sending API commands over an http connection using web-services is not a supported method.Reference:Check Point Management APIs

Total 626 questions
Go to page: of 63