ExamGecko
Home Home / Checkpoint / 156-315.81

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 34

Question list
Search
Search

What is the purpose of the CPCA process?

A.
Monitoring the status of processes.
A.
Monitoring the status of processes.
Answers
B.
Sending and receiving logs.
B.
Sending and receiving logs.
Answers
C.
Communication between GUI clients and the SmartCenter server.
C.
Communication between GUI clients and the SmartCenter server.
Answers
D.
Generating and modifying certificates.
D.
Generating and modifying certificates.
Answers
Suggested answer: D

Explanation:

The purpose of the CPCA process is to generate and modify certificates for Check Point products and features. CPCA stands for Check Point Certificate Authority and it is responsible for creating and managing certificates for internal communication between Check Point components, such as Security Gateways, Security Management Servers, SmartConsole clients, and OPSEC applications. CPCA also supports external certificate authorities and can import and export certificates from other sources.

What is the default shell of Gaia CLI?

A.
Monitor
A.
Monitor
Answers
B.
CLI.sh
B.
CLI.sh
Answers
C.
Read-only
C.
Read-only
Answers
D.
Bash
D.
Bash
Answers
Suggested answer: A

Explanation:

The default shell of Gaia CLI is clish. Clish stands for Command Line Interface Shell and it is a restrictive shell that controls the number of commands available in the CLI. Clish provides a user-friendly interface that supports command completion, history, and help functions. Clish also supports role-based administration, which means that different users can have different levels of access to Gaia features and commands based on their roles.

You have created a rule at the top of your Rule Base to permit Guest Wireless access to the Internet. However, when guest users attempt to reach the Internet, they are not seeing the splash page to accept your Terms of Service, and cannot access the Internet. How can you fix this?

A.
Right click Accept in the rule, select ''More'', and then check 'Enable Identity Captive Portal'.
A.
Right click Accept in the rule, select ''More'', and then check 'Enable Identity Captive Portal'.
Answers
B.
On the firewall object, Legacy Authentication screen, check 'Enable Identity Captive Portal'.
B.
On the firewall object, Legacy Authentication screen, check 'Enable Identity Captive Portal'.
Answers
C.
In the Captive Portal screen of Global Properties, check 'Enable Identity Captive Portal'.
C.
In the Captive Portal screen of Global Properties, check 'Enable Identity Captive Portal'.
Answers
D.
On the Security Management Server object, check the box 'Identity Logging'.
D.
On the Security Management Server object, check the box 'Identity Logging'.
Answers
Suggested answer: A

Explanation:

The correct way to enable Identity Captive Portal for a specific rule is to right click Accept in the rule, select ''More'', and then check 'Enable Identity Captive Portal'. This will allow guest users to see the splash page and accept the Terms of Service before accessing the Internet. Identity Captive Portal is a feature that enables identity awareness for guest users who are not authenticated by other methods, such as Active Directory or Identity Agent. Identity Captive Portal can be enabled globally or per rule, depending on the security policy requirements.

Fill in the blank: A new license should be generated and installed in all of the following situations EXCEPT when ________ .

A.
The license is attached to the wrong Security Gateway.
A.
The license is attached to the wrong Security Gateway.
Answers
B.
The existing license expires.
B.
The existing license expires.
Answers
C.
The license is upgraded.
C.
The license is upgraded.
Answers
D.
The IP address of the Security Management or Security Gateway has changed.
D.
The IP address of the Security Management or Security Gateway has changed.
Answers
Suggested answer: D

Explanation:

A new license should be generated and installed in all of the following situations except when the IP address of the Security Management or Security Gateway has changed. This is because Check Point licenses are not bound to IP addresses, but to other parameters such as MAC addresses, CPU IDs, or hostnames. Therefore, changing the IP address of a licensed machine does not affect the validity of the license. However, changing other parameters, such as replacing a network card or renaming a machine, may require a new license. Additionally, when the existing license expires or the license is upgraded to a higher level or a different package, a new license is needed.

Which Check Point software blade provides protection from zero-day and undiscovered threats?

A.
Firewall
A.
Firewall
Answers
B.
Threat Emulation
B.
Threat Emulation
Answers
C.
Application Control
C.
Application Control
Answers
D.
Threat Extraction
D.
Threat Extraction
Answers
Suggested answer: B

Explanation:

The Check Point software blade that provides protection from zero-day and undiscovered threats is Threat Emulation. Threat Emulation is a sandboxing technology that inspects files for malicious behavior in a virtual environment before they reach the end user. Threat Emulation can detect and block malware that tries to evade traditional signature-based solutions by using unknown or obfuscated techniques. Threat Emulation can also generate forensic reports and provide actionable intelligence on the malware origin and behavior.

If there are two administration logged in at the same time to the SmartConsole, and there are objects locked for editing, what must be done to make them available or other administrators? (Choose the BEST answer.)

A.
Publish or discard the session.
A.
Publish or discard the session.
Answers
B.
Revert the session.
B.
Revert the session.
Answers
C.
Save and install the Policy.
C.
Save and install the Policy.
Answers
D.
Delete older versions of database.
D.
Delete older versions of database.
Answers
Suggested answer: A

Explanation:

The only way to make objects locked for editing available for other administrators is to publish or discard the session that contains the changes. Publishing the session will save and share the changes with other administrators, while discarding the session will undo and discard the changes. Saving the session will only save the changes locally, but not share them with others or release the locks. Reverting the session will restore a previous version of the session, but not affect the locks. Saving and installing the policy will only install the policy on the gateways, but not share or discard the changes in SmartConsole. Deleting older versions of database will only free up disk space, but not affect the locks.

Fill in the blanks: A _______ license requires an administrator to designate a gateway for attachment whereas a ________ license is automatically attached to a Security Gateway.

A.
Formal; corporate
A.
Formal; corporate
Answers
B.
Local; formal
B.
Local; formal
Answers
C.
Local; central
C.
Local; central
Answers
D.
Central; local
D.
Central; local
Answers
Suggested answer: D

Explanation:

A central license requires an administrator to designate a gateway for attachment whereas a local license is automatically attached to a Security Gateway. A central license is managed by a Security Management Server or a Multi-Domain Security Management Server and can be attached to any gateway that is managed by that server. A local license is managed by a local license server on each gateway and cannot be moved to another gateway. Central licenses are more flexible and scalable than local licenses, as they can be easily transferred between gateways without generating new licenses.

An administrator is creating an IPsec site-to-site VPN between his corporate office and branch office. Both offices are protected by Check Point Security Gateway managed by the same Security Management Server. While configuring the VPN community to specify the pre-shared secret the administrator found that the check box to enable pre-shared secret and cannot be enabled.

Why does it not allow him to specify the pre-shared secret?

A.
IPsec VPN blade should be enabled on both Security Gateway.
A.
IPsec VPN blade should be enabled on both Security Gateway.
Answers
B.
Pre-shared can only be used while creating a VPN between a third party vendor and Check Point Security Gateway.
B.
Pre-shared can only be used while creating a VPN between a third party vendor and Check Point Security Gateway.
Answers
C.
Certificate based Authentication is the only authentication method available between two Security Gateway managed by the same SMS.
C.
Certificate based Authentication is the only authentication method available between two Security Gateway managed by the same SMS.
Answers
D.
The Security Gateways are pre-R75.40.
D.
The Security Gateways are pre-R75.40.
Answers
Suggested answer: C

Explanation:

When two Security Gateways are managed by the same Security Management Server, they use certificate based authentication to establish a VPN tunnel. This is because the Security Management Server acts as an internal certificate authority (ICA) that can issue and revoke certificates for the Security Gateways. The Security Management Server also maintains a trust relationship with the Security Gateways, which is based on a one-time password (OTP) that is used to initialize secure internal communication (SIC). Therefore, there is no need to use a pre-shared secret for authentication between two Security Gateways managed by the same SMS.

Fill in the blank: Authentication rules are defined for ________ .

A.
User groups
A.
User groups
Answers
B.
Users using UserCheck
B.
Users using UserCheck
Answers
C.
Individual users
C.
Individual users
Answers
D.
All users in the database
D.
All users in the database
Answers
Suggested answer: A

Explanation:

Authentication rules are defined for user groups, not individual users or all users in the database. Authentication rules allow you to control which user groups can access specific resources or services through the Security Gateway. You can define different authentication methods and schemes for different user groups, such as Check Point Password, OS Password, RADIUS, TACACS, SecurID, LDAP, or Certificate. You can also define different session timeouts and source restrictions for different user groups. Authentication rules are processed before the network access rules in the rule base.

How is communication between different Check Point components secured in R81? As with all questions, select the BEST answer.

A.
By using IPSEC
A.
By using IPSEC
Answers
B.
By using SIC
B.
By using SIC
Answers
C.
By using ICA
C.
By using ICA
Answers
D.
By using 3DES
D.
By using 3DES
Answers
Suggested answer: B

Explanation:

Communication between different Check Point components is secured by using SIC, which stands for secure internal communication. SIC is a certificate-based channel that uses standards-based TLS 1.2 for creating secure connections and AES128 for encryption. SIC ensures that only authorized components can communicate with each other and that the communication is protected from eavesdropping and tampering. SIC is established by using a one-time password (OTP) that is generated when a Check Point component is created or installed. The OTP is used to initialize the trust relationship between the component and the Security Management Server, which acts as an internal certificate authority (ICA) that issues and revokes certificates for the components.

Total 626 questions
Go to page: of 63