ExamGecko
Home Home / Checkpoint / 156-315.81

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 31

Question list
Search
Search

The ____ software blade package uses CPU-level and OS-level sandboxing in order to detect and block malware.

A.
Next Generation Threat Prevention
A.
Next Generation Threat Prevention
Answers
B.
Next Generation Threat Emulation
B.
Next Generation Threat Emulation
Answers
C.
Next Generation Threat Extraction
C.
Next Generation Threat Extraction
Answers
D.
Next Generation Firewall
D.
Next Generation Firewall
Answers
Suggested answer: B

Explanation:

The software blade package that uses CPU-level and OS-level sandboxing in order to detect and block malware is the Next Generation Threat Emulation.This package is part of the Check Point SandBlast Zero-Day Protection solution, which protects organizations against unknown malware, zero-day threats and targeted attacks, and prevents infections from undiscovered exploits1.

CPU-level and OS-level sandboxing are two techniques that Check Point uses to analyze files and objects for malicious behavior. CPU-level inspection is a unique technology that detects malware at the pre-infection stage by examining the CPU instructions that the file executes.This allows Check Point to identify and block malware that tries to evade detection by using obfuscation, encryption, or polymorphism12.

OS-level sandboxing is a complementary technology that runs files and objects in a virtualized environment and monitors their behavior for malicious indicators.This allows Check Point to detect and block malware that tries to exploit vulnerabilities in the operating system or applications, or that performs malicious actions such as downloading additional payloads, modifying system settings, or communicating with command and control servers12.

Therefore, the correct answer is B) The Next Generation Threat Emulation software blade package uses CPU-level and OS-level sandboxing in order to detect and block malware.

1, Understanding SandBlast - Check Point Software Technologies

2, HOW TO CHOOSE YOUR NEXT SANDBOXING SOLUTION - Check Point Software

3, CHECK POINT + SERVICENOW

4, Check Point Quantum Edge Datasheet

Which tool is used to enable ClusterXL?

A.
SmartUpdate
A.
SmartUpdate
Answers
B.
cpconfig
B.
cpconfig
Answers
C.
SmartConsole
C.
SmartConsole
Answers
D.
sysconfig
D.
sysconfig
Answers
Suggested answer: B

Explanation:

The tool that is used to enable ClusterXL is cpconfig.ClusterXL is a software-based Load Sharing and High Availability solution that distributes network traffic between clusters of redundant Security Gateways1.ClusterXL can be enabled on Check Point Security Gateways running on Gaia OS, SecurePlatform OS, IPSO OS, or X-Series XOS2.

To enable ClusterXL, the administrator must run the cpconfig command on each cluster member and select the option to enable ClusterXL. This will prompt the administrator to choose the ClusterXL mode (High Availability or Load Sharing) and the Cluster Control Protocol (CCP) mode (Broadcast or Multicast).After enabling ClusterXL, the administrator must reboot the cluster members for the changes to take effect34.

Therefore, the correct answer is B) The tool that is used to enable ClusterXL is cpconfig.

1, Introduction to ClusterXL - Check Point Software

2, ClusterXL Requirements and Compatibility - Check Point Software

3, Configuring ClusterXL - Check Point Software

4, How to configure ClusterXL - Check Point Software Technologies

How many policy layers do Access Control policy support?

A.
2
A.
2
Answers
B.
4
B.
4
Answers
C.
1
C.
1
Answers
D.
3
D.
3
Answers
Suggested answer: A

Explanation:

The Access Control policy supports two policy layers. These are the Network layer and the Application & URL Filtering layer. The Network layer contains rules that control the network traffic based on the source, destination, service, and action.The Application & URL Filtering layer contains rules that control the application and web access based on the application, site category, and user identity12.

The Access Control policy can also use inline layers, which are sub-policies that are embedded within a rule.Inline layers allow more granular control over specific traffic or scenarios, such as VPN, Mobile Access, or different user groups13.However, inline layers are not considered as separate policy layers, but rather as extensions of the parent rule4.

Therefore, the correct answer is A. The Access Control policy supports two policy layers.

1, Policy Layers in R80.x - Check Point CheckMates

2, Access Control policies, layers, and rules | Check Point Firewall ...

3, Chapter 8: Introduction to Policies, Layers, and Rules - Check Point ...

4, Creating an Access Control Policy - Check Point Software

One of major features in R81 SmartConsole is concurrent administration.

Which of the following is NOT possible considering that AdminA, AdminB and AdminC are editing the same Security Policy?

A.
A lock icon shows that a rule or an object is locked and will be available.
A.
A lock icon shows that a rule or an object is locked and will be available.
Answers
B.
AdminA and AdminB are editing the same rule at the same time.
B.
AdminA and AdminB are editing the same rule at the same time.
Answers
C.
A lock icon next to a rule informs that any Administrator is working on this particular rule.
C.
A lock icon next to a rule informs that any Administrator is working on this particular rule.
Answers
D.
AdminA, AdminB and AdminC are editing three different rules at the same time.
D.
AdminA, AdminB and AdminC are editing three different rules at the same time.
Answers
Suggested answer: B

Explanation:

One of the major features in R81 SmartConsole is concurrent administration. This feature allows multiple administrators to work on the same Security Policy simultaneously, without blocking each other or creating conflicts.Concurrent administration improves the efficiency and productivity of security management operations1.

However, not all of the options given are possible considering that AdminA, AdminB and AdminC are editing the same Security Policy. The correct answer is B) AdminA and AdminB are editing the same rule at the same time. This is not possible because concurrent administration uses a locking mechanism to prevent multiple administrators from modifying the same rule or object at the same time. When an administrator clicks on a rule or an object, it becomes locked and a lock icon appears next to it.The lock icon shows the name of the administrator who is working on that rule or object, and prevents other administrators from editing it until it is unlocked12.

Therefore, the other options are possible considering that AdminA, AdminB and AdminC are editing the same Security Policy.Option A is possible because a lock icon shows that a rule or an object is locked and will be available when the administrator who locked it finishes working on it or logs out of SmartConsole12.Option C is possible because a lock icon next to a rule informs that any administrator is working on this particular rule, and hovering over the lock icon will show the name of that administrator12.Option D is possible because AdminA, AdminB and AdminC are editing three different rules at the same time, which does not create any conflicts or blockages12.

After the initial installation on Check Point appliance, you notice that the Management-interface and default gateway are incorrect.

Which commands could you use to set the IP to 192.168.80.200/24 and default gateway to 192.168.80.1.

A.
set interface Mgmt ipv4-address 192.168.80.200 mask-length 24set static-route default nexthop gateway address 192.168.80.1 onsave config
A.
set interface Mgmt ipv4-address 192.168.80.200 mask-length 24set static-route default nexthop gateway address 192.168.80.1 onsave config
Answers
B.
set interface Mgmt ipv4-address 192.168.80.200 255.255.255.0add static-route 0.0.0.0. 0.0.0.0 gw 192.168.80.1 onsave config
B.
set interface Mgmt ipv4-address 192.168.80.200 255.255.255.0add static-route 0.0.0.0. 0.0.0.0 gw 192.168.80.1 onsave config
Answers
C.
set interface Mgmt ipv4-address 192.168.80.200 255.255.255.0set static-route 0.0.0.0. 0.0.0.0 gw 192.168.80.1 onsave config
C.
set interface Mgmt ipv4-address 192.168.80.200 255.255.255.0set static-route 0.0.0.0. 0.0.0.0 gw 192.168.80.1 onsave config
Answers
D.
set interface Mgmt ipv4-address 192.168.80.200 mask-length 24add static-route default nexthop gateway address 192.168.80.1 onsave config
D.
set interface Mgmt ipv4-address 192.168.80.200 mask-length 24add static-route default nexthop gateway address 192.168.80.1 onsave config
Answers
Suggested answer: A

Explanation:

To set the IP address and default gateway of the Management interface on a Check Point appliance, you can use the following commands:

set interface Mgmt ipv4-address 192.168.80.200 mask-length 24- This command sets the IPv4 address of the Management interface to 192.168.80.200 and the subnet mask to 255.255.255.0 (24 bits).

set static-route default nexthop gateway address 192.168.80.1 on- This command sets the default gateway to 192.168.80.1 and enables the static route.

save config- This command saves the configuration changes to the appliance.

These commands are documented in theCheck Point appliance initial installationguide, which you can find in the web search results.

The other options are incorrect because they use invalid syntax or parameters for the commands. For example, option B usesadd static-routeinstead ofset static-route, option C uses0.0.0.0.instead of0.0.0.0, and option D usesadd static-route defaultinstead ofset static-route default.

Tom has connected to the R81 Management Server remotely using SmartConsole and is in the process of making some Rule Base changes, when he suddenly loses connectivity. Connectivity is restored shortly afterward.

What will happen to the changes already made?

A.
Tom's changes will have been stored on the Management when he reconnects and he will not lose any of his work.
A.
Tom's changes will have been stored on the Management when he reconnects and he will not lose any of his work.
Answers
B.
Tom will have to reboot his SmartConsole computer, and access the Management cache store on that computer, which is only accessible after a reboot.
B.
Tom will have to reboot his SmartConsole computer, and access the Management cache store on that computer, which is only accessible after a reboot.
Answers
C.
Tom's changes will be lost since he lost connectivity and he will have to start again.
C.
Tom's changes will be lost since he lost connectivity and he will have to start again.
Answers
D.
Tom will have to reboot his SmartConsole computer, clear to cache, and restore changes.
D.
Tom will have to reboot his SmartConsole computer, clear to cache, and restore changes.
Answers
Suggested answer: A

Explanation:

Tom's changes will have been stored on the Management when he reconnects and he will not lose any of his work.

This is because SmartConsole has a feature called Concurrent Administration, which allows multiple administrators to work on the same Security Policy simultaneously, without blocking each other or creating conflicts. Concurrent Administration uses a locking mechanism to prevent multiple administrators from modifying the same rule or object at the same time. When an administrator clicks on a rule or an object, it becomes locked and a lock icon appears next to it.The lock icon shows the name of the administrator who is working on that rule or object, and prevents other administrators from editing it until it is unlocked12.

Concurrent Administration also has a feature called Session Persistence, which preserves the changes made by an administrator in case of a network failure or a SmartConsole crash. When an administrator reconnects to the Management Server after a network failure or a SmartConsole crash, they can resume their work from where they left off, without losing any changes.The changes are stored locally on the administrator's machine until they are published to the Management Server13.

Therefore, if Tom has connected to the R81 Management Server remotely using SmartConsole and is in the process of making some Rule Base changes, when he suddenly loses connectivity, his changes will not be lost. They will be stored locally on his machine and he can resume his work when he reconnects to the Management Server.

What key is used to save the current CPView page in a filename format cpview_''cpview process ID''.cap''number of captures''?

A.
S
A.
S
Answers
B.
W
B.
W
Answers
C.
C
C.
C
Answers
D.
Space bar
D.
Space bar
Answers
Suggested answer: C

Explanation:

The key C is used to save the current CPView page in a filename format cpview_''cpview process ID''.cap'number of captures'. This is a feature of CPView that allows the user to capture the current page for later analysis or troubleshooting. The file is saved in the /var/log directory on the Security Gateway.

Reference:Check Point Resource Library, page 3.

Topic 4, Exam Pool D

On the following picture an administrator configures Identity Awareness:

After clicking ''Next'' the above configuration is supported by:

A.
Kerberos SSO which will be working for Active Directory integration
A.
Kerberos SSO which will be working for Active Directory integration
Answers
B.
Based on Active Directory integration which allows the Security Gateway to correlate Active Directory users and machines to IP addresses in a method that is completely transparent to the user.
B.
Based on Active Directory integration which allows the Security Gateway to correlate Active Directory users and machines to IP addresses in a method that is completely transparent to the user.
Answers
C.
Obligatory usage of Captive Portal.
C.
Obligatory usage of Captive Portal.
Answers
D.
The ports 443 or 80 what will be used by Browser-Based and configured Authentication.
D.
The ports 443 or 80 what will be used by Browser-Based and configured Authentication.
Answers
Suggested answer: B

Explanation:

After clicking ''Next'', the above configuration is supported by Active Directory integration which allows the Security Gateway to correlate Active Directory users and machines to IP addresses in a method that is completely transparent to the user. This is a feature of Identity Awareness that allows the Security Gateway to identify users and machines on the network and enforce security policies based on their identity.The administrator can configure Identity Awareness to use various methods for acquiring identity, including Active Directory integration, browser-based authentication, terminal servers, and transparent authentication1.

Reference:Check Point Resource Library, page 3.

Which of the completed statements is NOT true? The WebUI can be used to manage user accounts and:

A.
assign privileges to users.
A.
assign privileges to users.
Answers
B.
edit the home directory of the user.
B.
edit the home directory of the user.
Answers
C.
add users to your Gaia system.
C.
add users to your Gaia system.
Answers
D.
assign user rights to their home directory in the Security Management Server.
D.
assign user rights to their home directory in the Security Management Server.
Answers
Suggested answer: D

Explanation:

The WebUI can be used to manage user accounts and assign privileges to users. It can also add users to your Gaia system and edit the home directory of the user.However, it cannot assign user rights to their home directory in the Security Management Server1.

Reference:Check Point Resource Library, page 3.

In the Check Point Security Management Architecture, which component(s) can store logs?

A.
SmartConsole
A.
SmartConsole
Answers
B.
Security Management Server and Security Gateway
B.
Security Management Server and Security Gateway
Answers
C.
Security Management Server
C.
Security Management Server
Answers
D.
SmartConsole and Security Management Server
D.
SmartConsole and Security Management Server
Answers
Suggested answer: B

Explanation:

In the Check Point Security Management Architecture, both the Security Management Server and Security Gateway can store logs.The Security Management Server stores logs related to management activities, while the Security Gateway stores logs related to network traffic1.

Reference:Check Point Resource Library, page 3.

Total 626 questions
Go to page: of 63