ExamGecko
Home Home / Checkpoint / 156-315.81

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 37

Question list
Search
Search

To optimize Rule Base efficiency, the most hit rules should be where?

A.
Removed from the Rule Base.
A.
Removed from the Rule Base.
Answers
B.
Towards the middle of the Rule Base.
B.
Towards the middle of the Rule Base.
Answers
C.
Towards the top of the Rule Base.
C.
Towards the top of the Rule Base.
Answers
D.
Towards the bottom of the Rule Base.
D.
Towards the bottom of the Rule Base.
Answers
Suggested answer: C

Explanation:

To optimize Rule Base efficiency, the most hit rules should be towards the top of the Rule Base. This is because the Rule Base is processed from top to bottom, and the first rule that matches the traffic is applied. Therefore, placing the most hit rules at the top reduces the number of rules that need to be checked and improves the performance of the firewall.

Reference:R81 Security Management Administration Guide, page 97.

What two ordered layers make up the Access Control Policy Layer?

A.
URL Filtering and Network
A.
URL Filtering and Network
Answers
B.
Network and Threat Prevention
B.
Network and Threat Prevention
Answers
C.
Application Control and URL Filtering
C.
Application Control and URL Filtering
Answers
D.
Network and Application Control
D.
Network and Application Control
Answers
Suggested answer: D

Explanation:

What two ordered layers make up the Access Control Policy Layer? Network and Application Control are the two ordered layers that make up the Access Control Policy Layer. The Network layer controls network access based on source, destination, service, time, etc. The Application Control layer controls application access based on users, groups, applications, content categories, etc. The Network layer is always processed before the Application Control layer.

Reference:R81 Security Management Administration Guide, page 29.

Fill in the blanks: In the Network policy layer, the default action for the Implied last rule is ____ all traffic. However, in the Application Control policy layer, the default action is ______ all traffic.

A.
Accept; redirect
A.
Accept; redirect
Answers
B.
Accept; drop
B.
Accept; drop
Answers
C.
Redirect; drop
C.
Redirect; drop
Answers
D.
Drop; accept
D.
Drop; accept
Answers
Suggested answer: D

Explanation:

In the Network policy layer, the default action for the Implied last rule isdropall traffic. However, in the Application Control policy layer, the default action isacceptall traffic. The Implied last rule is a rule that is automatically added at the end of each policy layer and defines what to do with traffic that does not match any of the user-defined rules. The default actions for each policy layer can be changed in the Global Properties or in the layer properties.

Reference:R81 Security Management Administration Guide, page 30.

Which command is used to obtain the configuration lock in Gaia?

A.
Lock database override
A.
Lock database override
Answers
B.
Unlock database override
B.
Unlock database override
Answers
C.
Unlock database lock
C.
Unlock database lock
Answers
D.
Lock database user
D.
Lock database user
Answers
Suggested answer: A

Explanation:

Which command is used to obtain the configuration lock in Gaia? The command that is used to obtain the configuration lock in Gaia islock database override. This command allows a user to take over the configuration lock from another user who is currently logged in with read/write access. The other user will be forced to logout and will lose any unsaved changes. This command should be used with caution and only when necessary.

Reference:Gaia Administration Guide R81, page 15.

What is the default shell for the command line interface?

A.
Expert
A.
Expert
Answers
B.
Clish
B.
Clish
Answers
C.
Admin
C.
Admin
Answers
D.
Normal
D.
Normal
Answers
Suggested answer: B

Explanation:

What is the default shell for the command line interface? The default shell for the command line interface isClish. Clish is a shell that provides a menu-based interface for configuring various system settings, such as network interfaces, routing, DNS, NTP, SNMP, SSH, etc. Clish also provides help and completion features for easier navigation. To switch from Clish to Expert mode, which allows running Linux commands, use the commandexpert.

Reference:Gaia Administration Guide R81, page 29.

You plan to automate creating new objects using new R81 Management API. You decide to use GAIA CLI for this task.

What is the first step to run management API commands on GAIA's shell?

A.
mgmt_admin@teabag > id.txt
A.
mgmt_admin@teabag > id.txt
Answers
B.
mgmt_login
B.
mgmt_login
Answers
C.
login user admin password teabag
C.
login user admin password teabag
Answers
D.
mgmt_cli login user ''admin'' password ''teabag'' > id.txt
D.
mgmt_cli login user ''admin'' password ''teabag'' > id.txt
Answers
Suggested answer: B

Explanation:

You plan to automate creating new objects using new R81 Management API. You decide to use GAIA CLI for this task.

The first step to run management API commands on GAIA's shell ismgmt_login. This command allows you to login to the management server and obtain a session ID, which is required for running other management API commands. You can also specify the user name and password as parameters, or enter them interactively. The session ID is stored in the file$CPDIR/tmp/.api_sessionby default, unless you specify a different file name.

Reference:R81 Management API Reference Guide, page 15.

On R81.20 the IPS Blade is managed by:

A.
Threat Protection policy
A.
Threat Protection policy
Answers
B.
Anti-Bot Blade
B.
Anti-Bot Blade
Answers
C.
Threat Prevention policy
C.
Threat Prevention policy
Answers
D.
Layers on Firewall policy
D.
Layers on Firewall policy
Answers
Suggested answer: C

Explanation:

On R81.20 the IPS Blade is managed by theThreat Prevention policy. The Threat Prevention policy is a unified policy that includes Anti-virus, IPS, Anti-bot, and Threat Emulation software blades. The IPS blade provides protection against network attacks and exploits by inspecting the traffic and blocking malicious packets. The IPS blade can be configured with different profiles and exceptions to suit different security needs.

Reference:R81 Threat Prevention Administration Guide, page 15.

When users connect to the Mobile Access portal they are unable to open File Shares.

Which log file would you want to examine?

A.
cvpnd.elg
A.
cvpnd.elg
Answers
B.
httpd.elg
B.
httpd.elg
Answers
C.
vpnd.elg
C.
vpnd.elg
Answers
D.
fw.elg
D.
fw.elg
Answers
Suggested answer: A

Explanation:

When users connect to the Mobile Access portal they are unable to open File Shares.

The log file that you would want to examine iscvpnd.elg. This log file contains information about the Mobile Access VPN daemon, which handles the connections from the Mobile Access portal to the internal resources, such as File Shares, Web Applications, etc. The log file is located in the directory$FWDIR/log/on the Security Gateway. You can use the commandfw log -f cvpnd.elgto view the log file in real time.

Reference:R81 Mobile Access Administration Guide, page 255.

What is the correct order of the default ''fw monitor'' inspection points?

A.
i, o, l, O
A.
i, o, l, O
Answers
B.
i, l, o, O
B.
i, l, o, O
Answers
C.
1, 2, 3, 4
C.
1, 2, 3, 4
Answers
D.
l, i, O, o
D.
l, i, O, o
Answers
Suggested answer: B

Explanation:

https://community.checkpoint.com/t5/General-Topics/Check-Point-Inspection-points-iIoO/td-p/34938

The default order of the 'fw monitor' inspection points is:

i (input): this is the first inspection point, where packets enter the firewall.

l (local): this is the second inspection point, where packets are processed locally by the firewall, before being forwarded to the next hop.

o (output): this is the third inspection point, where packets are sent out to their final destination.

O (offload): this is the fourth inspection point, where packets are offloaded to hardware acceleration for faster processing.

What is the default size of NAT table fwx_alloc?

A.
20000
A.
20000
Answers
B.
35000
B.
35000
Answers
C.
25000
C.
25000
Answers
D.
10000
D.
10000
Answers
Suggested answer: C

Explanation:

What is the default size of NAT table fwx_alloc? The default size of NAT table fwx_alloc is25000. This table stores the connections that require NAT translation by the Security Gateway. The size of this table can be changed by using the commandfw ctl set int fwx_alloc <value>, where <value> is the desired number of connections. The maximum value is 65535. To make this change permanent, you need to add this command to the file$FWDIR/conf/fwaffinity.confon the Security Gateway.

Reference: [R81 Performance Tuning Administration Guide], page 126.

Total 626 questions
Go to page: of 63