ExamGecko
Home Home / Checkpoint / 156-315.81

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 5

Question list
Search
Search

There are 4 ways to use the Management API for creating host object with R81 Management API. Which one is NOT correct?

A.
Using Web Services
A.
Using Web Services
Answers
B.
Using Mgmt_cli tool
B.
Using Mgmt_cli tool
Answers
C.
Using CLISH
C.
Using CLISH
Answers
D.
Using SmartConsole GUI console
D.
Using SmartConsole GUI console
Answers
E.
Events are collected with SmartWorkflow from Trouble Ticket systems
E.
Events are collected with SmartWorkflow from Trouble Ticket systems
Answers
Suggested answer: E

Explanation:

There are four ways to use the Management API for creating host object with R81 Management API: Using Web Services, Using mgmt_cli tool, Using CLISH, and Using SmartConsole GUI console. Events are collected with SmartWorkflow from Trouble Ticket systems is not a correct option.Reference:Check Point Management APIs

CoreXL is supported when one of the following features is enabled:

A.
Route-based VPN
A.
Route-based VPN
Answers
B.
IPS
B.
IPS
Answers
C.
IPv6
C.
IPv6
Answers
D.
Overlapping NAT
D.
Overlapping NAT
Answers
Suggested answer: B

Explanation:

CoreXL is supported when one of the following features is enabled: IPS. CoreXL does not support Check Point Suite with these features: Route-based VPN, IPv6, Overlapping NAT, QoS, Content Awareness, Application Control, URL Filtering, Identity Awareness, HTTPS Inspection, DLP, Anti-Bot, Anti-Virus, Threat Emulation.Reference:CoreXL

You noticed that CPU cores on the Security Gateway are usually 100% utilized and many packets were dropped. You don't have a budget to perform a hardware upgrade at this time. To optimize drops you decide to use Priority Queues and fully enable Dynamic Dispatcher. How can you enable them?

A.
fw ctl multik dynamic_dispatching on
A.
fw ctl multik dynamic_dispatching on
Answers
B.
fw ctl multik dynamic_dispatching set_mode 9
B.
fw ctl multik dynamic_dispatching set_mode 9
Answers
C.
fw ctl multik set_mode 9
C.
fw ctl multik set_mode 9
Answers
D.
fw ctl multik pq enable
D.
fw ctl multik pq enable
Answers
Suggested answer: C

Explanation:

To optimize drops you decide to use Priority Queues and fully enable Dynamic Dispatcher. You can enable them by using the command fw ctl multik set_mode 9. This command sets the SecureXL mode to 9, which means that Priority Queues are enabled and Dynamic Dispatcher is fully enabled.Reference:SecureXL Mechanism

Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidates management console. CPM allows the GUI client and management server to communicate via web services using ___________.

A.
TCP port 19009
A.
TCP port 19009
Answers
B.
TCP Port 18190
B.
TCP Port 18190
Answers
C.
TCP Port 18191
C.
TCP Port 18191
Answers
D.
TCP Port 18209
D.
TCP Port 18209
Answers
Suggested answer: A

Explanation:

Check Point Management (cpm) is the main management process that provides the architecture for a consolidated management console. CPM allows the GUI client and management server to communicate via web services using TCP port 19009 by default.Reference:CPM process

Which command is used to set the CCP protocol to Multicast?

A.
cphaprob set_ccp multicast
A.
cphaprob set_ccp multicast
Answers
B.
cphaconf set_ccp multicast
B.
cphaconf set_ccp multicast
Answers
C.
cphaconf set_ccp no_broadcast
C.
cphaconf set_ccp no_broadcast
Answers
D.
cphaprob set_ccp no_broadcast
D.
cphaprob set_ccp no_broadcast
Answers
Suggested answer: B

Explanation:

The cphaconf set_ccp multicast command is used to set the Cluster Control Protocol (CCP) to Multicast mode. This mode allows cluster members to communicate with each other using multicast packets. The other commands are either incorrect or set the CCP to Broadcast mode.Reference:ClusterXL Administration Guide

Which packet info is ignored with Session Rate Acceleration?

A.
source port ranges
A.
source port ranges
Answers
B.
source ip
B.
source ip
Answers
C.
source port
C.
source port
Answers
D.
same info from Packet Acceleration is used
D.
same info from Packet Acceleration is used
Answers
Suggested answer: C

Explanation:

Session Rate Acceleration is a SecureXL feature that accelerates the establishment of new connections by bypassing the inspection of the first packet of each session. Session Rate Acceleration ignores the source port information of the packet, as well as the destination port ranges, protocol type, and VPN information. The other packet info is used by Packet Acceleration, which is another SecureXL feature that accelerates the forwarding of subsequent packets of an established connection.Reference:SecureXL Mechanism

Which is the least ideal Synchronization Status for Security Management Server High Availability deployment?

A.
Synchronized
A.
Synchronized
Answers
B.
Never been synchronized
B.
Never been synchronized
Answers
C.
Lagging
C.
Lagging
Answers
D.
Collision
D.
Collision
Answers
Suggested answer: D

Explanation:

The least ideal Synchronization Status for Security Management Server High Availability deployment is Collision. This status indicates that both members have modified the same object independently, resulting in a conflict that needs to be resolved manually. The other statuses are either normal or indicate a temporary delay in synchronization.Reference:High Availability Administration Guide

During inspection of your Threat Prevention logs you find four different computers having one event each with a Critical Severity. Which of those hosts should you try to remediate first?

A.
Host having a Critical event found by Threat Emulation
A.
Host having a Critical event found by Threat Emulation
Answers
B.
Host having a Critical event found by IPS
B.
Host having a Critical event found by IPS
Answers
C.
Host having a Critical event found by Antivirus
C.
Host having a Critical event found by Antivirus
Answers
D.
Host having a Critical event found by Anti-Bot
D.
Host having a Critical event found by Anti-Bot
Answers
Suggested answer: D

Explanation:

The host having a Critical event found by Anti-Bot should be remediated first, as it indicates that the host is infected by a botnet malware that is communicating with a Command and Control server. This poses a serious threat to the network security and data integrity. The other events may indicate potential malware infection or attack attempts, but not necessarily successful ones.Reference:Threat Prevention Administration Guide

In R81 spoofing is defined as a method of:

A.
Disguising an illegal IP address behind an authorized IP address through Port Address Translation.
A.
Disguising an illegal IP address behind an authorized IP address through Port Address Translation.
Answers
B.
Hiding your firewall from unauthorized users.
B.
Hiding your firewall from unauthorized users.
Answers
C.
Detecting people using false or wrong authentication logins
C.
Detecting people using false or wrong authentication logins
Answers
D.
Making packets appear as if they come from an authorized IP address.
D.
Making packets appear as if they come from an authorized IP address.
Answers
Suggested answer: D

Explanation:

In R81, spoofing is defined as a method of making packets appear as if they come from an authorized IP address. Spoofing can be used by attackers to bypass security policies or hide their identity. Check Point firewalls use anti-spoofing mechanisms to prevent spoofed packets from entering or leaving the network.Reference:Security Gateway R81 Administration Guide:

Connections to the Check Point R81 Web API use what protocol?

A.
HTTPS
A.
HTTPS
Answers
B.
RPC
B.
RPC
Answers
C.
VPN
C.
VPN
Answers
D.
SIC
D.
SIC
Answers
Suggested answer: A

Explanation:

Connections to the Check Point R81 Web API use the HTTPS protocol. The Web API is a RESTful web service that allows you to perform management tasks on the Security Management Server using HTTP requests.Reference:Check Point Management APIs

Total 626 questions
Go to page: of 63