ExamGecko
Home Home / Checkpoint / 156-315.81

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 36

Question list
Search
Search

Which pre-defined Permission Profile should be assigned to an administrator that requires full access to audit all configurations without modifying them?

A.
Auditor
A.
Auditor
Answers
B.
Read Only All
B.
Read Only All
Answers
C.
Super User
C.
Super User
Answers
D.
Full Access
D.
Full Access
Answers
Suggested answer: B

Explanation:

The pre-defined Permission Profile that should be assigned to an administrator that requires full access to audit all configurations without modifying them is Read Only All. This profile grants read-only access to all features and blades in SmartConsole, including logs and reports. This profile is suitable for auditors who need to review the security policy and settings, but not change them.

Reference:R81 Security Management Administration Guide, page 57.

When Identity Awareness is enabled, which identity source(s) is(are) used for Application Control?

A.
RADIUS
A.
RADIUS
Answers
B.
Remote Access and RADIUS
B.
Remote Access and RADIUS
Answers
C.
AD Query
C.
AD Query
Answers
D.
AD Query and Browser-based Authentication
D.
AD Query and Browser-based Authentication
Answers
Suggested answer: D

Explanation:

When Identity Awareness is enabled, AD Query and Browser-based Authentication are used as identity sources for Application Control. AD Query allows the Security Gateway to query Active Directory servers for identity information based on IP addresses. Browser-based Authentication allows the Security Gateway to redirect unidentified users to a captive portal where they can authenticate with their credentials. These identity sources provide accurate and up-to-date identity information for Application Control, which can enforce granular policies based on user, group, machine, and domain objects.

Reference:R81 Identity Awareness Administration Guide, page 9.

True or False: In R81, more than one administrator can login to the Security Management Server with write permission at the same time.

A.
False, this feature has to be enabled in the Global Properties.
A.
False, this feature has to be enabled in the Global Properties.
Answers
B.
True, every administrator works in a session that is independent of the other administrators.
B.
True, every administrator works in a session that is independent of the other administrators.
Answers
C.
True, every administrator works on a different database that is independent of the other administrators.
C.
True, every administrator works on a different database that is independent of the other administrators.
Answers
D.
False, only one administrator can login with write permission.
D.
False, only one administrator can login with write permission.
Answers
Suggested answer: B

Explanation:

In R81, more than one administrator can login to the Security Management Server with write permission at the same time. This feature is enabled by default and allows concurrent administration of the security policy. Every administrator works in a session that is independent of the other administrators. Changes made by one administrator are not visible to others until they are published. Administrators can also lock objects to prevent others from editing them until they are unlocked.

Reference:R81 Security Management Administration Guide, page 43.

Which utility allows you to configure the DHCP service on Gaia from the command line?

A.
ifconfig
A.
ifconfig
Answers
B.
dhcp_ofg
B.
dhcp_ofg
Answers
C.
sysconfig
C.
sysconfig
Answers
D.
cpconfig
D.
cpconfig
Answers
Suggested answer: C

Explanation:

The utility that allows you to configure the DHCP service on Gaia from the command line is sysconfig. This utility provides a menu-based interface for configuring various system settings, including network interfaces, routing, DNS, NTP, SNMP, SSH, etc. One of the options in sysconfig is DHCP Server Configuration, which allows you to enable or disable the DHCP service, define DHCP scopes, set lease time, etc.

Reference:Gaia Administration Guide R81, page 29.

There are two R77.30 Security Gateways in the Firewall Cluster. They are named FW_A and FW_B. The cluster is configured to work as HA (High availability) with default cluster configuration. FW_A is configured to have higher priority than FW_B. FW_A was active and processing the traffic in the morning. FW_B was standby. Around 1100 am, its interfaces went down and this caused a failover. FW_B became active. After an hour, FW_A's interface issues were resolved and it became operational.

When it re-joins the cluster, will it become active automatically?

A.
No, since 'maintain' current active cluster member' option on the cluster object properties is enabled by default.
A.
No, since 'maintain' current active cluster member' option on the cluster object properties is enabled by default.
Answers
B.
No, since 'maintain' current active cluster member' option is enabled by default on the Global Properties.
B.
No, since 'maintain' current active cluster member' option is enabled by default on the Global Properties.
Answers
C.
Yes, since 'Switch to higher priority cluster member' option on the cluster object properties is enabled by default.
C.
Yes, since 'Switch to higher priority cluster member' option on the cluster object properties is enabled by default.
Answers
D.
Yes, since 'Switch to higher priority cluster member' option is enabled by default on the Global Properties.
D.
Yes, since 'Switch to higher priority cluster member' option is enabled by default on the Global Properties.
Answers
Suggested answer: A

Explanation:

There are two R77.30 Security Gateways in the Firewall Cluster. They are named FW_A and FW_B. The cluster is configured to work as HA (High availability) with default cluster configuration. FW_A is configured to have higher priority than FW_B. FW_A was active and processing the traffic in the morning. FW_B was standby. Around 1100 am, its interfaces went down and this caused a failover. FW_B became active. After an hour, FW_A's interface issues were resolved and it became operational.

When it re-joins the cluster, it will not become active automatically, since 'maintain current active cluster member' option on the cluster object properties is enabled by default. This option prevents a failback to the original active member after a failover, unless the current active member fails or is manually switched over. This option provides stability and avoids unnecessary failovers.

Reference:R77 ClusterXL Administration Guide, page 23.

DLP and Geo Policy are examples of what type of Policy?

A.
Standard Policies
A.
Standard Policies
Answers
B.
Shared Policies
B.
Shared Policies
Answers
C.
Inspection Policies
C.
Inspection Policies
Answers
D.
Unified Policies
D.
Unified Policies
Answers
Suggested answer: B

Explanation:

DLP and Geo Policy are examples of Shared Policies. Shared Policies are policies that can be applied to multiple gateways or clusters, regardless of their Access Control policy. Shared Policies allow administrators to manage common security settings across different gateways or clusters, such as Data Loss Prevention, Geo Protection, Threat Prevention, HTTPS Inspection, etc.

Reference:R81 Security Management Administration Guide, page 31.

Fill in the blank: The IPS policy for pre-R81 gateways is installed during the _______ .

A.
Firewall policy install
A.
Firewall policy install
Answers
B.
Threat Prevention policy install
B.
Threat Prevention policy install
Answers
C.
Anti-bot policy install
C.
Anti-bot policy install
Answers
D.
Access Control policy install
D.
Access Control policy install
Answers
Suggested answer: C

Explanation:

The IPS policy for pre-R81 gateways is installed during the Anti-bot policy install. The Anti-bot policy install includes both Anti-bot and IPS protections for pre-R81 gateways, since they share the same inspection engine. For R81 and above gateways, the IPS policy is installed separately as part of the Threat Prevention policy install, which also includes Anti-virus and Threat Emulation protections.

Reference:R81 Threat Prevention Administration Guide, page 15.

How many users can have read/write access in Gaia at one time?

A.
Infinite
A.
Infinite
Answers
B.
One
B.
One
Answers
C.
Three
C.
Three
Answers
D.
Two
D.
Two
Answers
Suggested answer: B

Explanation:

How many users can have read/write access in Gaia at one time? Only one user can have read/write access in Gaia at one time. This is to prevent conflicts and inconsistencies in the configuration changes made by different users. If another user tries to login with read/write access while a user is already logged in, they will receive a warning message and will be given the option to either login with read-only access or force the other user to logout.

Reference: [Gaia Administration Guide R81], page 15.

Which software blade does NOT accompany the Threat Prevention policy?

A.
Anti-virus
A.
Anti-virus
Answers
B.
IPS
B.
IPS
Answers
C.
Threat Emulation
C.
Threat Emulation
Answers
D.
Application Control and URL Filtering
D.
Application Control and URL Filtering
Answers
Suggested answer: D

Explanation:

Which software blade does NOT accompany the Threat Prevention policy? Application Control and URL Filtering software blade does not accompany the Threat Prevention policy. The Threat Prevention policy is a unified policy that includes Anti-virus, IPS, Anti-bot, and Threat Emulation software blades. Application Control and URL Filtering software blade is part of the Access Control policy, which is a separate policy that controls network access based on users, applications, content, and other criteria.

Reference:R81 Security Management Administration Guide, page 29.

Check Point ClusterXL Active/Active deployment is used when:

A.
Only when there is Multicast solution set up.
A.
Only when there is Multicast solution set up.
Answers
B.
There is Load Sharing solution set up.
B.
There is Load Sharing solution set up.
Answers
C.
Only when there is Unicast solution set up.
C.
Only when there is Unicast solution set up.
Answers
D.
There is High Availability solution set up.
D.
There is High Availability solution set up.
Answers
Suggested answer: B

Explanation:

Check Point ClusterXL Active/Active deployment is used when there is Load Sharing solution set up. Load Sharing is a ClusterXL mode that allows distributing the network traffic between all cluster members, while still providing high availability in case of failures. Load Sharing can be configured as either Unicast or Multicast, depending on the network topology and switches support.

Reference:R81 ClusterXL Administration Guide, page 9.

Total 626 questions
Go to page: of 63