ExamGecko
Home / Checkpoint / 156-315.81 / List of questions
Ask Question

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 3

Add to Whishlist

List of questions

Question 21

Report Export Collapse

What is the correct command to observe the Sync traffic in a VRRP environment?

fw monitor --e ''accept[12:4,b]=224.0.0.18;''
fw monitor --e ''accept[12:4,b]=224.0.0.18;''
fw monitor --e ''accept port(6118;''
fw monitor --e ''accept port(6118;''
fw monitor --e ''accept proto=mcVRRP;''
fw monitor --e ''accept proto=mcVRRP;''
fw monitor --e ''accept dst=224.0.0.18;''
fw monitor --e ''accept dst=224.0.0.18;''
Suggested answer: D
Explanation:

The correct command to observe the Sync traffic in a VRRP environment isfw monitor --e ''accept dst=224.0.0.18;''. This command captures the packets that have the destination IP address of 224.0.0.18, which is the multicast address used by VRRP for synchronization. The other commands are either not valid or not specific to VRRP Sync traffic.

Reference: [Check Point R81 ClusterXL Administration Guide], Check Point R81 Performance Tuning Administration Guide

asked 16/09/2024
Andrea Marini
42 questions

Question 22

Report Export Collapse

What has to be taken into consideration when configuring Management HA?

The Database revisions will not be synchronized between the management servers
The Database revisions will not be synchronized between the management servers
SmartConsole must be closed prior to synchronized changes in the objects database
SmartConsole must be closed prior to synchronized changes in the objects database
If you wanted to use Full Connectivity Upgrade, you must change the Implied Rules to allow FW1_cpredundant to pass before the Firewall Control Connections.
If you wanted to use Full Connectivity Upgrade, you must change the Implied Rules to allow FW1_cpredundant to pass before the Firewall Control Connections.
For Management Server synchronization, only External Virtual Switches are supported. So, if you wanted to employ Virtual Routers instead, you have to reconsider your design.
For Management Server synchronization, only External Virtual Switches are supported. So, if you wanted to employ Virtual Routers instead, you have to reconsider your design.
Suggested answer: A
Explanation:

When configuring Management HA, you have to take into consideration that the Database revisions will not be synchronized between the management servers. Database revisions are snapshots of the database that are created manually or automatically when installing a policy or saving changes. They are stored locally on each management server and are not replicated by Management HA. The other options are either not true or not relevant to Management HA.

Reference:Check Point R81 Installation and Upgrade Guide

asked 16/09/2024
Cristian Lazo
44 questions

Question 23

Report Export Collapse

Which Mobile Access Application allows a secure container on Mobile devices to give users access to internal website, file share and emails?

Check Point Remote User
Check Point Remote User
Check Point Capsule Workspace
Check Point Capsule Workspace
Check Point Mobile Web Portal
Check Point Mobile Web Portal
Check Point Capsule Remote
Check Point Capsule Remote
Suggested answer: C
Explanation:

Check Point Mobile Web Portal is a Mobile Access Application that allows a secure container on mobile devices to give users access to internal websites, file shares and emails. The Mobile Web Portal is a web-based application that can be accessed from any browser on any device. It provides a user-friendly interface to access various resources on the corporate network without requiring a VPN client or additional software installation. The Mobile Web Portal supports authentication methods such as user name and password, certificate, one-time password (OTP), etc. The Mobile Web Portal also supports security features such as encryption, data leakage prevention (DLP), threat prevention, etc.

Reference:R81 Mobile Access Administration Guide

asked 16/09/2024
Zdenek Machura
32 questions

Question 24

Report Export Collapse

Which of the following process pulls application monitoring status?

fwd
fwd
fwm
fwm
cpwd
cpwd
cpd
cpd
Suggested answer: D
Explanation:

The process that pulls application monitoring status iscpd. cpd is a daemon that runs on Check Point products and performs various tasks related to management communication, policy installation, license verification, logging, etc. cpd also monitors the status of other processes and applications on the system and reports it to the management server. cpd uses SNMP to collect information from various sources, such as blades, gateways, servers, etc. You can view the application monitoring status in SmartConsole by using theGateways & Serverstab in theLogs & Monitorview.

Reference: Check Point Processes and Daemons

asked 16/09/2024
Bruce Baynes
31 questions

Question 25

Report Export Collapse

Identify the API that is not supported by Check Point currently.

R81 Management API-
R81 Management API-
Identity Awareness Web Services API
Identity Awareness Web Services API
Open REST API
Open REST API
OPSEC SDK
OPSEC SDK
Suggested answer: C
Explanation:

Check Point currently supports four types of APIs: R81 Management API, Identity Awareness Web Services API, OPSEC SDK, and Gaia REST API. The Open REST API is not a valid option.Reference:Check Point APIs

asked 16/09/2024
JEAN-MARIE HERMANT
34 questions

Question 26

Report Export Collapse

SandBlast Mobile identifies threats in mobile devices by using on-device, network, and cloud-based algorithms and has four dedicated components that constantly work together to protect mobile devices and their data. Which component is NOT part of the SandBlast Mobile solution?

Management Dashboard
Management Dashboard
Gateway
Gateway
Personal User Storage
Personal User Storage
Behavior Risk Engine
Behavior Risk Engine
Suggested answer: C
Explanation:

SandBlast Mobile has four components: Management Dashboard, Gateway, Behavior Risk Engine, and On-Device Network Protection. Personal User Storage is not part of the SandBlast Mobile solution.Reference:SandBlast Mobile Architecture

asked 16/09/2024
Mario Herrera GonzÑlez
52 questions

Question 27

Report Export Collapse

What are the different command sources that allow you to communicate with the API server?

SmartView Monitor, API_cli Tool, Gaia CLI, Web Services
SmartView Monitor, API_cli Tool, Gaia CLI, Web Services
SmartConsole GUI Console, mgmt_cli Tool, Gaia CLI, Web Services
SmartConsole GUI Console, mgmt_cli Tool, Gaia CLI, Web Services
SmartConsole GUI Console, API_cli Tool, Gaia CLI, Web Services
SmartConsole GUI Console, API_cli Tool, Gaia CLI, Web Services
API_cli Tool, Gaia CLI, Web Services
API_cli Tool, Gaia CLI, Web Services
Suggested answer: B
Explanation:

You can communicate with the API server using three command sources: SmartConsole GUI Console, mgmt_cli Tool, and Gaia CLI. Web Services are not a command source, but a way to access the API server using HTTP requests.Reference:Check Point Management APIs

asked 16/09/2024
Rocco Cristofaro
51 questions

Question 28

Report Export Collapse

What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?

Anti-Bot is the only countermeasure against unknown malware
Anti-Bot is the only countermeasure against unknown malware
Anti-Bot is the only protection mechanism which starts a counter-attack against known Command & Control Centers
Anti-Bot is the only protection mechanism which starts a counter-attack against known Command & Control Centers
Anti-Bot is the only signature-based method of malware protection.
Anti-Bot is the only signature-based method of malware protection.
Anti-Bot is a post-infection malware protection to prevent a host from establishing a connection to a Command & Control Center.
Anti-Bot is a post-infection malware protection to prevent a host from establishing a connection to a Command & Control Center.
Suggested answer: D
Explanation:

Anti-Bot is a post-infection malware protection that detects and blocks botnet communications from infected hosts to Command & Control servers. It is different from other Threat Prevention mechanisms that prevent malware from entering the network or executing on the hosts.Reference:Anti-Bot Software Blade

asked 16/09/2024
Frau Abir Bouassida
39 questions

Question 29

Report Export Collapse

Which TCP-port does CPM process listen to?

18191
18191
18190
18190
8983
8983
19009
19009
Suggested answer: D
Explanation:

The CPM process is the core process of the Security Management Server that handles all management operations. It listens to TCP-port 19009 by default.Reference:CPM process

asked 16/09/2024
Leandro Franklin Franklin
51 questions

Question 30

Report Export Collapse

Which method below is NOT one of the ways to communicate using the Management API's?

Typing API commands using the ''mgmt_cli'' command
Typing API commands using the ''mgmt_cli'' command
Typing API commands from a dialog box inside the SmartConsole GUI application
Typing API commands from a dialog box inside the SmartConsole GUI application
Typing API commands using Gaia's secure shell(clish)19+
Typing API commands using Gaia's secure shell(clish)19+
Sending API commands over an http connection using web-services
Sending API commands over an http connection using web-services
Suggested answer: D
Explanation:

The Management API supports three methods of communication: mgmt_cli command, SmartConsole GUI dialog box, and Gaia CLI. Sending API commands over an http connection using web-services is not a supported method.Reference:Check Point Management APIs

asked 16/09/2024
ANIKET PATEL
43 questions
Total 626 questions
Go to page: of 63