ExamGecko
Home Home / Checkpoint / 156-315.81

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 46

Question list
Search
Search

What Is the difference between Updatable Objects and Dynamic Objects

A.
Dynamic Objects ate maintained automatically by the Threat Cloud. Updatable Objects are created and maintained locally. In both cases there is no need to install policy for the changes to take effect.
A.
Dynamic Objects ate maintained automatically by the Threat Cloud. Updatable Objects are created and maintained locally. In both cases there is no need to install policy for the changes to take effect.
Answers
B.
Updatable Objects is a Threat Cloud Service. The provided Objects are updated automatically. Dynamic Objects are created and maintained locally For Dynamic Objects there is no need to install policy for the changes to take effect.
B.
Updatable Objects is a Threat Cloud Service. The provided Objects are updated automatically. Dynamic Objects are created and maintained locally For Dynamic Objects there is no need to install policy for the changes to take effect.
Answers
C.
Updatable Objects is a Threat Cloud Service. The provided Objects are updated automatically. Dynamic Objects are created and maintained locally In both cases there is no need to install policy for the changes to take effect.
C.
Updatable Objects is a Threat Cloud Service. The provided Objects are updated automatically. Dynamic Objects are created and maintained locally In both cases there is no need to install policy for the changes to take effect.
Answers
D.
Dynamic Objects are maintained automatically by the Threat Cloud. For Dynamic Objects there rs no need to install policy for the changes to take effect. Updatable Objects are created and maintained locally.
D.
Dynamic Objects are maintained automatically by the Threat Cloud. For Dynamic Objects there rs no need to install policy for the changes to take effect. Updatable Objects are created and maintained locally.
Answers
Suggested answer: B

Explanation:

Updatable Objects are a Threat Cloud Service that provides network objects that represent external services, such as Office 365, AWS, GEO locations, and more. These objects are updated automatically by Check Point and do not require policy installation for the changes to take effect. Dynamic Objects are created and maintained locally by the administrator and can be used to define temporary or changing network objects, such as IP addresses, ports, or ranges. Dynamic Objects also do not require policy installation for the changes to take effect.

Reference:Updatable Objects,Updateable Objects and NAT,R80.20 Updatable Domain Objects and CLI Commands.

Bob works for a big security outsourcing provider company and as he receives a lot of change requests per day he wants to use for scripting daily tasks the API services (torn Check Point for the GAIA API. Firstly he needs to be aware if the API services are running for the GAIA operating system. Which of the following Check Point Command is true:

A.
gala_dlish status
A.
gala_dlish status
Answers
B.
status gaiaapi
B.
status gaiaapi
Answers
C.
api_gala status
C.
api_gala status
Answers
D.
gala_api status
D.
gala_api status
Answers
Suggested answer: D

Explanation:

https://sc1.checkpoint.com/documents/latest/GaiaAPIs/#api_access~v1.7%20

The correct Check Point command to check if the API services are running for the GAIA operating system is gala_api status. The gala_api command is used to manage the API services in the GAIA operating system, and the status option is used to check the status of the API services.

What are the correct sleps upgrading a HA cluster (Ml is active. M2 is passive) using Multi-Version Cluster(MVC) Upgrade?

A.
1) Enable the MVC mechanism on both cluster members cphaprob mvc on 2) Upgrade the passive node M2 to R81.20 3) In SmartConsole. change the version of the cluster object 4) Install the Access Control Policy and make sure that the installation will not stop if installation on one cluster member fails 5) After examine the cluster states upgrade node M1 to R81.20 6) On each Cluster Member, disable the MVC mechanism
A.
1) Enable the MVC mechanism on both cluster members cphaprob mvc on 2) Upgrade the passive node M2 to R81.20 3) In SmartConsole. change the version of the cluster object 4) Install the Access Control Policy and make sure that the installation will not stop if installation on one cluster member fails 5) After examine the cluster states upgrade node M1 to R81.20 6) On each Cluster Member, disable the MVC mechanism
Answers
B.
1) Enable the MVC mechanism on both cluster members #cphaprob mvc on 2) Upgrade the passive node M2 to R81.20 3) In SmartConsole. change the version of the cluster object 4) Install the Access Control Policy 5) After examine the cluster states upgrade node M1 to R81.20 6) On each Cluster Member, disable the MVC mechanism and Install the Access Control Policy
B.
1) Enable the MVC mechanism on both cluster members #cphaprob mvc on 2) Upgrade the passive node M2 to R81.20 3) In SmartConsole. change the version of the cluster object 4) Install the Access Control Policy 5) After examine the cluster states upgrade node M1 to R81.20 6) On each Cluster Member, disable the MVC mechanism and Install the Access Control Policy
Answers
C.
1) In SmartConsole. change the version of the cluster object 2) Upgrade the passive node M2 to R81.20 3) Enable the MVC mechanism on the upgraded R81.20 Cluster Member M2 Wcphaconf mvc on 4) Install the Access Control Policy and make sure that the installation will not stop if installation on one cluster member fails 5) After examine the cluster states upgrade node M1 to R81.20 6) On each Cluster Member, disable the MVC mechanism and Install the Access Control Policy SmartConsole. change the version of the cluster object
C.
1) In SmartConsole. change the version of the cluster object 2) Upgrade the passive node M2 to R81.20 3) Enable the MVC mechanism on the upgraded R81.20 Cluster Member M2 Wcphaconf mvc on 4) Install the Access Control Policy and make sure that the installation will not stop if installation on one cluster member fails 5) After examine the cluster states upgrade node M1 to R81.20 6) On each Cluster Member, disable the MVC mechanism and Install the Access Control Policy SmartConsole. change the version of the cluster object
Answers
D.
1) Upgrade the passive node M2 to R81.20 2) Enable the MVC mechanism on the upgraded R81.20 Cluster Member M2 ttcphaconf mvc on 3) In SmartConsole, change the version of the cluster object 4} Install the Access Control Policy 5) After examine the cluster states upgrade node M1 to R81.20 6) On each Cluster Member, disable the MVC mechanism and Install the Access Control Policy upgrade the passive node M2 to R81.20
D.
1) Upgrade the passive node M2 to R81.20 2) Enable the MVC mechanism on the upgraded R81.20 Cluster Member M2 ttcphaconf mvc on 3) In SmartConsole, change the version of the cluster object 4} Install the Access Control Policy 5) After examine the cluster states upgrade node M1 to R81.20 6) On each Cluster Member, disable the MVC mechanism and Install the Access Control Policy upgrade the passive node M2 to R81.20
Answers
Suggested answer: D

Explanation:

The correct steps for upgrading a HA cluster using MVC are as follows:

Upgrade the passive node M2 to R81.20 using CPUSE or CLI.

Enable the MVC mechanism on the upgraded R81.20 Cluster Member M2 using the commandcphaconf mvc on.

In SmartConsole, change the version of the cluster object to R81.20.

Install the Access Control Policy and make sure that the installation will not stop if installation on one cluster member fails.

After examining the cluster states, upgrade node M1 to R81.20 using CPUSE or CLI.

On each Cluster Member, disable the MVC mechanism using the commandcphaconf mvc offand install the Access Control Policy.

What are the two modes for SNX (SSL Network Extender)?

A.
Network Mode and Application Mode
A.
Network Mode and Application Mode
Answers
B.
Visitor Mode and Office Mode
B.
Visitor Mode and Office Mode
Answers
C.
Network Mode and Hub Mode
C.
Network Mode and Hub Mode
Answers
D.
Office Mode and Hub Mode
D.
Office Mode and Hub Mode
Answers
Suggested answer: A

Explanation:

SNX (SSL Network Extender) is a thin VPN client installed on an endpoint user computer that provides secure remote access to a corporate network.It can be used with Mobile Access blade or the IPsec VPN blade via the Mobile Access or SNX portals1.SNX has two modes: Network Mode and Application Mode2.

Network Mode: In this mode, SNX creates a virtual network adapter on the endpoint computer and assigns it an IP address from the internal network. This allows the endpoint computer to access all the resources on the internal network as if it was physically connected to it.Network Mode supports all IP-based applications, including TCP and UDP applications2.

Application Mode: In this mode, SNX does not create a virtual network adapter on the endpoint computer, but instead intercepts the traffic of specific applications and forwards it to the Security Gateway. Application Mode supports only TCP-based applications that are defined in the Mobile Access policy.Application Mode is useful when Network Mode is not supported or when granular control over the applications is required2.

After having saved the Cllsh Configuration with the 'save configuration config.txt* command, where can you find the config.txt file?

A.
You will find it in the home directory of your usef account (e.g. /home/admirV)
A.
You will find it in the home directory of your usef account (e.g. /home/admirV)
Answers
B.
You can locate the file via SmartConsole > Command Line.
B.
You can locate the file via SmartConsole > Command Line.
Answers
C.
You have to launch the WebUl and go to 'Config' -> 'Export Conflg File' and specifly the destination directory of your local tile system
C.
You have to launch the WebUl and go to 'Config' -> 'Export Conflg File' and specifly the destination directory of your local tile system
Answers
D.
You cannot locate the file in the file system sine Clish does not have any access to the bash fie system
D.
You cannot locate the file in the file system sine Clish does not have any access to the bash fie system
Answers
Suggested answer: B

Explanation:

You can locate the file via SmartConsole > Command Line.According to the CLISH documentation1, when you save the configuration with the ''save configuration config.txt'' command, the file is stored in a temporary location on the management server.To access the file, you need to use SmartConsole and go to Command Line > View File > config.txt2.Alternatively, you can also use the ''show configuration'' command in CLISH to view the current configuration2.

What traffic does the Anti-bot feature block?

A.
Command and Control traffic from hosts that have been identified as infected
A.
Command and Control traffic from hosts that have been identified as infected
Answers
B.
Command and Control traffic to servers with reputation for hosting malware
B.
Command and Control traffic to servers with reputation for hosting malware
Answers
C.
Network traffic that is directed to unknown or malicious servers
C.
Network traffic that is directed to unknown or malicious servers
Answers
D.
Network traffic to hosts that have been identified as infected
D.
Network traffic to hosts that have been identified as infected
Answers
Suggested answer: A

Explanation:

The traffic that the Anti-bot feature blocks is command and control traffic from hosts that have been identified as infected. Anti-bot is a blade that detects and prevents botnet attacks by using a cloud-based service that provides up-to-date threat intelligence.When Anti-bot detects a host that is communicating with a malicious command and control server, it blocks the traffic and generates an alert2.The other options are not the types of traffic that Anti-bot blocks.

Reference:2: Check Point Software, Getting Started, Anti-Bot.

What is the command used to activated Multi-Version Cluster mode?

A.
set cluster member mvc on in Clish
A.
set cluster member mvc on in Clish
Answers
B.
set mvc on on Clish
B.
set mvc on on Clish
Answers
C.
set cluster MVC on in Expert Mode
C.
set cluster MVC on in Expert Mode
Answers
D.
set cluster mvc on in Expert Mode
D.
set cluster mvc on in Expert Mode
Answers
Suggested answer: A

Explanation:

The command used to activate Multi-Version Cluster mode isset cluster member mvc onin Clish. Multi-Version Cluster mode is a feature that allows cluster members to run different versions of Check Point software during a cluster upgrade. This reduces downtime and simplifies the upgrade process.To enable Multi-Version Cluster mode, the commandset cluster member mvc onmust be executed on each cluster member in Clish3.The other options are not valid commands for activating Multi-Version Cluster mode.

Reference:3: Check Point Software, Getting Started, Multi-Version Cluster.

What command is used to manually failover a Multi-Version Cluster during the upgrade?

A.
clusterXL_admin down in Expert Mode
A.
clusterXL_admin down in Expert Mode
Answers
B.
clusterXL_admin down in Clish
B.
clusterXL_admin down in Clish
Answers
C.
set cluster member state down in Clish
C.
set cluster member state down in Clish
Answers
D.
set cluster down in Expert Mode
D.
set cluster down in Expert Mode
Answers
Suggested answer: B

Explanation:

The command used to manually failover a Multi-Version Cluster during the upgrade isclusterXL_admin downin Clish. This command causes the cluster member to stop passing traffic and switch to the Down state. This triggers a failover to another cluster member that is in the Active or Ready state. This command can be used during a Multi-Version Cluster upgrade to manually control which cluster member handles the traffic. The other options are not valid commands for manually failing over a Multi-Version Cluster.

Reference: : Check Point Software, Getting Started, Manually Failing Over a Cluster Member.

What destination versions are supported for a Multi-Version Cluster Upgrade?

A.
R81.40 and later
A.
R81.40 and later
Answers
B.
R76 and later
B.
R76 and later
Answers
C.
R70 and Later
C.
R70 and Later
Answers
D.
R81.20 and Later
D.
R81.20 and Later
Answers
Suggested answer: D

Explanation:

The destination versions that are supported for a Multi-Version Cluster Upgrade are R81.20 and later. This means that the cluster members can be upgraded from any supported version to R81.20 or higher using the Multi-Version Cluster mode. R81.40, R76, and R70 are not supported destination versions for a Multi-Version Cluster Upgrade.

Reference: : Check Point Software, Getting Started, Supported Upgrade Paths

What is the benefit of Manual NAT over Automatic NAT?

A.
If you create a new Security Policy, the Manual NAT rules will be transferred to this new policy.
A.
If you create a new Security Policy, the Manual NAT rules will be transferred to this new policy.
Answers
B.
There is no benefit since Automatic NAT has in any case higher priority over Manual NAT
B.
There is no benefit since Automatic NAT has in any case higher priority over Manual NAT
Answers
C.
You have the full control about the priority of the NAT rules
C.
You have the full control about the priority of the NAT rules
Answers
D.
On IPSO and GAIA Gateways, it is handled in a stateful manner
D.
On IPSO and GAIA Gateways, it is handled in a stateful manner
Answers
Suggested answer: C

Explanation:

The benefit of Manual NAT over Automatic NAT is that you have full control over the priority of the NAT rules. Manual NAT allows you to create NAT rules that are independent of the security policy and specify the order in which they are applied. Automatic NAT creates NAT rules based on the objects' NAT properties and places them according to predefined criteria. The other options are not benefits of Manual NAT over Automatic NAT.

Reference: : Check Point Software, Getting Started, NAT Rule Base.

Total 626 questions
Go to page: of 63