ExamGecko
Home Home / Checkpoint / 156-315.81

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 33

Question list
Search
Search

Which of the following is an identity acquisition method that allows a Security Gateway to identify Active Directory users and computers?

A.
UserCheck
A.
UserCheck
Answers
B.
Active Directory Query
B.
Active Directory Query
Answers
C.
Account Unit Query
C.
Account Unit Query
Answers
D.
User Directory Query
D.
User Directory Query
Answers
Suggested answer: B

Explanation:

Active Directory Query is an identity acquisition method that allows a Security Gateway to identify Active Directory users and computers by querying domain controllers for security event logs. The Security Gateway sends a WMI query to each domain controller and receives a WMI event when a user logs in, logs out, or unlocks their computer. The Security Gateway then maps IP addresses to user names based on these events. Active Directory Query does not require any software installation on domain controllers or clients, but it requires certain permissions and configurations on the domain controllers

Why would an administrator see the message below?

A.
A new Policy Package created on both the Management and Gateway will be deleted and must be backed up first before proceeding.
A.
A new Policy Package created on both the Management and Gateway will be deleted and must be backed up first before proceeding.
Answers
B.
A new Policy Package created on the Management is going to be installed to the existing Gateway.
B.
A new Policy Package created on the Management is going to be installed to the existing Gateway.
Answers
C.
A new Policy Package created on the Gateway is going to be installed on the existing Management.
C.
A new Policy Package created on the Gateway is going to be installed on the existing Management.
Answers
D.
A new Policy Package created on the Gateway and transferred to the Management will be overwritten by the Policy Package currently on the Gateway but can be restored from a periodic backup on the Gateway.
D.
A new Policy Package created on the Gateway and transferred to the Management will be overwritten by the Policy Package currently on the Gateway but can be restored from a periodic backup on the Gateway.
Answers
Suggested answer: B

Explanation:

A Policy Package is a set of rules and settings that define how a Security Gateway enforces security on traffic that passes through it. A Policy Package can be created on either the Management Server or the Security Gateway, but it must be installed on both to take effect. When a new Policy Package is created on the Management Server, it must be installed on an existing Security Gateway that has a different Policy Package installed. The message below warns the administrator that installing a new Policy Package will overwrite the existing one on the Security Gateway.

https://www.bing.com/images/blob?bcid=qMoRhR0dzSkGmg

The message also advises the administrator to back up their existing configuration before proceeding with the installation.

Which command is used to add users to or from existing roles?

A.
Add rba user <User Name> roles <List>
A.
Add rba user <User Name> roles <List>
Answers
B.
Add rba user <User Name>
B.
Add rba user <User Name>
Answers
C.
Add user <User Name> roles <List>
C.
Add user <User Name> roles <List>
Answers
D.
Add user <User Name>
D.
Add user <User Name>
Answers
Suggested answer: A

Explanation:

The command to add users to or from existing roles isadd rba user <User Name> roles <List>. This command allows you to assign one or more roles to a user in the Gaia database. Roles are collections of permissions that define what actions a user can perform on the system. You can use predefined roles or create your own custom roles. To remove a role from a user, you can use the commanddelete rba user <User Name> roles <List>.

Which option, when applied to a rule, allows traffic to VPN gateways in specific VPN communities?

A.
All Connections (Clear or Encrypted)
A.
All Connections (Clear or Encrypted)
Answers
B.
Accept all encrypted traffic
B.
Accept all encrypted traffic
Answers
C.
Specific VPN Communities
C.
Specific VPN Communities
Answers
D.
All Site-to-Site VPN Communities
D.
All Site-to-Site VPN Communities
Answers
Suggested answer: C

Explanation:

The option that allows traffic to VPN gateways in specific VPN communities is Specific VPN Communities. This option lets you specify which VPN communities are allowed or denied by the rule. A VPN community is a group of VPN gateways or hosts that share the same VPN policy and keys. You can create different types of VPN communities, such as star, meshed, or remote access, depending on your network topology and security requirements. You can also use tags to group VPN gateways or hosts into logical categories.

Fill in the blank: An identity server uses a __________ for user authentication.

A.
Shared secret
A.
Shared secret
Answers
B.
Certificate
B.
Certificate
Answers
C.
One-time password
C.
One-time password
Answers
D.
Token
D.
Token
Answers
Suggested answer: D

Explanation:

An identity server uses a token for user authentication. A token is a piece of data that contains information about the user's identity, such as their username, email, roles, and claims. A token is digitally signed by the identity server and can be verified by the relying party (the application or service that needs to authenticate the user). A token can be issued in different formats, such as JSON Web Token (JWT) or Security Assertion Markup Language (SAML). A token can also have different lifetimes, such as short-lived access tokens or long-lived refresh tokens.

In SmartConsole, objects are used to represent physical and virtual network components and also some logical components. These objects are divided into several categories. Which of the following is NOT an objects category?

A.
Limit
A.
Limit
Answers
B.
Resource
B.
Resource
Answers
C.
Custom Application / Site
C.
Custom Application / Site
Answers
D.
Network Object
D.
Network Object
Answers
Suggested answer: B

Explanation:

Resource is not an objects category in SmartConsole. Objects are used to represent physical and virtual network components and also some logical components. These objects are divided into several categories, such as Network Object, Host, Gateway, Service, Time Object, Custom Application / Site, Limit, and Group. A resource is a type of object that represents an application or content that is accessible through HTTP or HTTPS protocols. A resource can be used to define access rules for users who connect through Identity Awareness or Mobile Access blades.

Which of the following blades is NOT subscription-based and therefore does not have to be renewed on a regular basis?

A.
Application Control
A.
Application Control
Answers
B.
Threat Emulation
B.
Threat Emulation
Answers
C.
Anti-Virus
C.
Anti-Virus
Answers
D.
Advanced Networking Blade
D.
Advanced Networking Blade
Answers
Suggested answer: D

Explanation:

The Advanced Networking Blade is not subscription-based and therefore does not have to be renewed on a regular basis. The Advanced Networking Blade is a software blade that provides advanced routing capabilities for Check Point Security Gateways. It supports dynamic routing protocols such as OSPF, BGP, RIP, and PIM, as well as features such as Policy-Based Routing (PBR), Multicast Routing, and IPv6 support. The Advanced Networking Blade is included in the Next Generation Firewall (NGFW) package and does not require a separate license.

Fill in the blank: __________ information is included in ''Full Log'' tracking option, but is not included in ''Log'' tracking option?

A.
Destination port
A.
Destination port
Answers
B.
Data type
B.
Data type
Answers
C.
File attributes
C.
File attributes
Answers
D.
Application
D.
Application
Answers
Suggested answer: B

Explanation:

The Full Log tracking option includes more information than the Log tracking option, such as the data type of the traffic. The data type indicates the type of content that was transferred, such as text, image, video, or audio. The data type can be used for filtering and reporting purposes. The Log tracking option only includes basic information, such as source, destination, service, action, and time.

Which options are given on features, when editing a Role on Gaia Platform?

A.
Read/Write, Read Only
A.
Read/Write, Read Only
Answers
B.
Read/Write, Read Only, None
B.
Read/Write, Read Only, None
Answers
C.
Read/Write, None
C.
Read/Write, None
Answers
D.
Read Only, None
D.
Read Only, None
Answers
Suggested answer: B

Explanation:

The options that are given on features, when editing a Role on Gaia Platform are Read/Write, Read Only, and None. These options determine the level of access that a user has to a specific feature or command in Gaia. If a user has Read/Write access to a feature, they can view and modify the settings of that feature. If a user has Read Only access to a feature, they can only view the settings of that feature, but not change them. If a user has None access to a feature, they cannot view or modify the settings of that feature.

Fill in the blanks: Gaia can be configured using the ______ or _____ .

A.
GaiaUI; command line interface
A.
GaiaUI; command line interface
Answers
B.
WebUI; Gaia Interface
B.
WebUI; Gaia Interface
Answers
C.
Command line interface; WebUI
C.
Command line interface; WebUI
Answers
D.
Gaia Interface; GaiaUI
D.
Gaia Interface; GaiaUI
Answers
Suggested answer: C

Explanation:

Gaia can be configured using the command line interface (CLI) or the WebUI. The CLI is a text-based interface that allows users to enter commands and view responses in a terminal window. The CLI can be accessed through a console connection, an SSH connection, or a Telnet connection. The WebUI is a graphical interface that allows users to configure Gaia settings through a web browser. The WebUI can be accessed by entering the IP address of the Gaia device in the browser's address bar.

Total 626 questions
Go to page: of 63