Checkpoint 156-315.81 Practice Test - Questions Answers, Page 3

List of questions
Question 21

What is the correct command to observe the Sync traffic in a VRRP environment?
The correct command to observe the Sync traffic in a VRRP environment isfw monitor --e ''accept dst=224.0.0.18;''. This command captures the packets that have the destination IP address of 224.0.0.18, which is the multicast address used by VRRP for synchronization. The other commands are either not valid or not specific to VRRP Sync traffic.
Reference: [Check Point R81 ClusterXL Administration Guide], Check Point R81 Performance Tuning Administration Guide
Question 22

What has to be taken into consideration when configuring Management HA?
When configuring Management HA, you have to take into consideration that the Database revisions will not be synchronized between the management servers. Database revisions are snapshots of the database that are created manually or automatically when installing a policy or saving changes. They are stored locally on each management server and are not replicated by Management HA. The other options are either not true or not relevant to Management HA.
Reference:Check Point R81 Installation and Upgrade Guide
Question 23

Which Mobile Access Application allows a secure container on Mobile devices to give users access to internal website, file share and emails?
Check Point Mobile Web Portal is a Mobile Access Application that allows a secure container on mobile devices to give users access to internal websites, file shares and emails. The Mobile Web Portal is a web-based application that can be accessed from any browser on any device. It provides a user-friendly interface to access various resources on the corporate network without requiring a VPN client or additional software installation. The Mobile Web Portal supports authentication methods such as user name and password, certificate, one-time password (OTP), etc. The Mobile Web Portal also supports security features such as encryption, data leakage prevention (DLP), threat prevention, etc.
Reference:R81 Mobile Access Administration Guide
Question 24

Which of the following process pulls application monitoring status?
The process that pulls application monitoring status iscpd. cpd is a daemon that runs on Check Point products and performs various tasks related to management communication, policy installation, license verification, logging, etc. cpd also monitors the status of other processes and applications on the system and reports it to the management server. cpd uses SNMP to collect information from various sources, such as blades, gateways, servers, etc. You can view the application monitoring status in SmartConsole by using theGateways & Serverstab in theLogs & Monitorview.
Reference: Check Point Processes and Daemons
Question 25

Identify the API that is not supported by Check Point currently.
Check Point currently supports four types of APIs: R81 Management API, Identity Awareness Web Services API, OPSEC SDK, and Gaia REST API. The Open REST API is not a valid option.Reference:Check Point APIs
Question 26

SandBlast Mobile identifies threats in mobile devices by using on-device, network, and cloud-based algorithms and has four dedicated components that constantly work together to protect mobile devices and their data. Which component is NOT part of the SandBlast Mobile solution?
SandBlast Mobile has four components: Management Dashboard, Gateway, Behavior Risk Engine, and On-Device Network Protection. Personal User Storage is not part of the SandBlast Mobile solution.Reference:SandBlast Mobile Architecture
Question 27

What are the different command sources that allow you to communicate with the API server?
You can communicate with the API server using three command sources: SmartConsole GUI Console, mgmt_cli Tool, and Gaia CLI. Web Services are not a command source, but a way to access the API server using HTTP requests.Reference:Check Point Management APIs
Question 28

What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?
Anti-Bot is a post-infection malware protection that detects and blocks botnet communications from infected hosts to Command & Control servers. It is different from other Threat Prevention mechanisms that prevent malware from entering the network or executing on the hosts.Reference:Anti-Bot Software Blade
Question 29

Which TCP-port does CPM process listen to?
The CPM process is the core process of the Security Management Server that handles all management operations. It listens to TCP-port 19009 by default.Reference:CPM process
Question 30

Which method below is NOT one of the ways to communicate using the Management API's?
The Management API supports three methods of communication: mgmt_cli command, SmartConsole GUI dialog box, and Gaia CLI. Sending API commands over an http connection using web-services is not a supported method.Reference:Check Point Management APIs
Question