ExamGecko
Home Home / Checkpoint / 156-315.81

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 40

Question list
Search
Search

What is required for a certificate-based VPN tunnel between two gateways with separate management systems?

A.
Mutually Trusted Certificate Authorities
A.
Mutually Trusted Certificate Authorities
Answers
B.
Shared User Certificates
B.
Shared User Certificates
Answers
C.
Shared Secret Passwords
C.
Shared Secret Passwords
Answers
D.
Unique Passwords
D.
Unique Passwords
Answers
Suggested answer: A

Explanation:

A certificate-based VPN tunnel between two gateways with separate management systems requires mutually trusted certificate authorities. This means that each gateway must have a certificate issued by a certificate authority (CA) that the other gateway trusts. The CA can be either an internal CA or an external CA. The CA issues certificates that contain the public key and identity information of the gateway. The gateway uses its private key to sign and encrypt the VPN traffic. The other gateway can verify the signature and decrypt the traffic using the public key in the certificate. This ensures the authenticity, integrity, and confidentiality of the VPN tunnel.

Remote Access VPN R81.20 Administration Guide, page 12

DeepDive Webinar - R81.20 Seamless VPN Connection to Public Cloud, slide 9

When performing a minimal effort upgrade, what will happen to the network traffic?

A.
All connections that were initiated before the upgrade will be dropped, causing network downtime
A.
All connections that were initiated before the upgrade will be dropped, causing network downtime
Answers
B.
All connections that were initiated before the upgrade will be handled normally
B.
All connections that were initiated before the upgrade will be handled normally
Answers
C.
All connections that were initiated before the upgrade will be handled by the standby gateway
C.
All connections that were initiated before the upgrade will be handled by the standby gateway
Answers
D.
All connections that were initiated before the upgrade will be handled by the active gateway
D.
All connections that were initiated before the upgrade will be handled by the active gateway
Answers
Suggested answer: B

Explanation:

A minimal effort upgrade is a process of upgrading the Security Gateway software without changing the configuration or policy. It is done by using the CPUSE (Check Point Update Service Engine) tool, which is available in the Gaia Portal or CLI. The CPUSE tool performs a pre-upgrade verification to check the compatibility and readiness of the system for the upgrade. If the verification passes, the CPUSE tool installs the new software package and reboots the system. During the reboot, there is a short network downtime, but it does not affect the existing connections. All connections that were initiated before the upgrade will be handled normally by the upgraded gateway. The minimal effort upgrade preserves the existing configuration and policy, so there is no need to reinstall the policy or reconfigure the gateway after the upgrade.

Check Point Upgrade Path and Management Servers and Security Gateways Compatibility Maps, section ''Minimal Effort Upgrade''

INSTALLATION AND UPGRADE GUIDE R81, page 21-22

Which command will reset the kernel debug options to default settings?

A.
fw ctl dbg -a 0
A.
fw ctl dbg -a 0
Answers
B.
fw ctl dbg resetall
B.
fw ctl dbg resetall
Answers
C.
fw ctl debug 0
C.
fw ctl debug 0
Answers
D.
fw ctl debug set 0
D.
fw ctl debug set 0
Answers
Suggested answer: C

Explanation:

The commandfw ctl debug 0will reset the kernel debug options to default settings. This command will disable all the debug flags and clear the debug buffer. It is recommended to use this command before and after performing a kernel debug, to avoid any interference or confusion with other debug outputs. The commandfw ctl debug 0is also equivalent tofw ctl debug -buf 0.

Best Practices - HTTPS Inspection - Check Point Software, section ''How to perform a Kernel Debug''

LOGGINGAND MONITORING R81 - Check Point Software, page 104

When defining QoS global properties, which option below is not valid?

A.
Weight
A.
Weight
Answers
B.
Authenticated timeout
B.
Authenticated timeout
Answers
C.
Schedule
C.
Schedule
Answers
D.
Rate
D.
Rate
Answers
Suggested answer: D

Explanation:

QoS global properties are the settings that apply to all QoS rules and QoS interfaces on the Security Gateway.They include the following options12:

Weight: This is the relative importance of a QoS rule compared to other QoS rules. A higher weight means a higher priority. The default weight is 1, and the maximum weight is 1000.

Authenticated timeout: This is the time period in seconds that a connection remains in the QoS rule after the last packet is sent or received. The default timeout is 600 seconds, and the minimum timeout is 60 seconds.

Schedule: This is the time period in which a QoS rule is active. You can define a schedule for each day of the week, or use the default schedule of always active.

Rate: This is not a valid option for QoS global properties. Rate is an option for QoS rule action, which defines the maximum bandwidth allocated for a QoS rule. The rate can be specified in Kbps, Mbps, or percentage of interface speed.

Which command shows only the table names of all kernel tables?

A.
fwtab-t
A.
fwtab-t
Answers
B.
fw tab -s
B.
fw tab -s
Answers
C.
fw tab -n
C.
fw tab -n
Answers
D.
fw tab -k
D.
fw tab -k
Answers
Suggested answer: B

Explanation:

The commandfw tabis used to display the contents of the kernel tables1. The command has several options that can modify the output.The option-sshows only the table names and the number of entries in each table1. For example:

The option-tshows the contents of a specific table, given by its name or ID1. For example:

The option-nshows the numeric values of the fields in the tables, instead of resolving them to names1. For example:

The option-kshows the kernel references for each entry in the table1. For example:

Therefore, the correct answer is B, as it shows only the table names of all kernel tables.

When configuring SmartEvent Initial settings, you must specify a basic topology for SmartEvent to help it calculate traffic direction for events. What is this setting called and what are you defining?

A.
Network, and defining your Class A space
A.
Network, and defining your Class A space
Answers
B.
Topology, and you are defining the Internal network
B.
Topology, and you are defining the Internal network
Answers
C.
Internal addresses you are defining the gateways
C.
Internal addresses you are defining the gateways
Answers
D.
Internal network(s) you are defining your networks
D.
Internal network(s) you are defining your networks
Answers
Suggested answer: D

Explanation:

When configuring SmartEvent Initial settings, you must specify a basic topology for SmartEvent to help it calculate traffic direction for events. This setting is called Internal network(s) and you are defining your networks. You can specify one or more networks or IP addresses that are considered internal for SmartEvent. This helps SmartEvent to determine the direction of the traffic (inbound, outbound, or internal) and generate events accordingly.

Reference: [SmartEvent Administration Guide]

What does the Log 'Views' tab show when SmartEvent is Correlating events?

A.
A list of common reports
A.
A list of common reports
Answers
B.
Reports for customization
B.
Reports for customization
Answers
C.
Top events with charts and graphs
C.
Top events with charts and graphs
Answers
D.
Details of a selected logs
D.
Details of a selected logs
Answers
Suggested answer: D

Explanation:

The Log ''Views'' tab shows the details of a selected log when SmartEvent is correlating events. You can select a log from the Logs tab and click on the Views tab to see more information about the log, such as source, destination, service, action, blade, rule number, etc. You can also customize the columns and filters in the Views tab to display only the relevant fields for your analysis.

Reference: [SmartEvent User Guide]

Which component is NOT required to communicate with the Web Services API?

A.
API key
A.
API key
Answers
B.
session ID token
B.
session ID token
Answers
C.
content-type
C.
content-type
Answers
D.
Request payload
D.
Request payload
Answers
Suggested answer: A

Explanation:

The component that is not required to communicate with the Web Services API is the API key. The Web Services API uses a session ID token for authentication, which is obtained by sending a login request with a valid username and password. The other components are required for sending requests and receiving responses from the Web Services API. The content-type specifies the format of the data being sent or received, such as JSON or XML. The request payload contains the data and parameters for the API call, such as command name, object name, etc.

Reference: [Web Services API Reference Guide]

Sieve is a Cyber Security Engineer working for Global Bank with a large scale deployment of Check Point Enterprise Appliances Steve's manager. Diana asks him to provide firewall connection table details from one of the firewalls for which he is responsible. Which of these commands may impact performance briefly and should not be used during heavy traffic times of day?

A.
fw tab -t connections -s
A.
fw tab -t connections -s
Answers
B.
fw tab -t connections
B.
fw tab -t connections
Answers
C.
fw tab -t connections -c
C.
fw tab -t connections -c
Answers
D.
fw tab -t connections -f
D.
fw tab -t connections -f
Answers
Suggested answer: B

Explanation:

The command that may impact performance briefly and should not be used during heavy traffic times of day is fw tab -t connections. This command displays all the entries in the connections table, which can be very large and consume a lot of CPU resources. The other commands are less intensive and can be used safely. The command fw tab -t connections -s displays only the statistics of the connections table, such as number of entries, peak size, etc. The command fw tab -t connections -c clears all the entries in the connections table. The command fw tab -t connections -f displays only the entries that match a filter expression.

Reference: [fw tab Command]

Which of the following is a task of the CPD process?

A.
Invoke and monitor critical processes and attempts to restart them if they fail
A.
Invoke and monitor critical processes and attempts to restart them if they fail
Answers
B.
Transfers messages between Firewall processes
B.
Transfers messages between Firewall processes
Answers
C.
Log forwarding
C.
Log forwarding
Answers
D.
Responsible for processing most traffic on a security gateway
D.
Responsible for processing most traffic on a security gateway
Answers
Suggested answer: B

Explanation:

The task of the CPD process that is listed among the options is transferring messages between Firewall processes. The CPD process is responsible for inter-process communication between various Check Point daemons, such as FWM, FWD, CPD, CPM, etc. It also handles licensing and status report requests from other processes. The other tasks are performed by different processes. The task of invoking and monitoring critical processes and attempting to restart them if they fail is performed by the WatchDog process. The task of log forwarding is performed by the FWD process. The task of processing most traffic on a security gateway is performed by the Firewall kernel module.

Reference: [Check Point Processes and Daemons]

Total 626 questions
Go to page: of 63