ExamGecko
Home / Checkpoint / 156-315.81 / List of questions
Ask Question

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 5

Add to Whishlist

List of questions

Question 41

Report Export Collapse

There are 4 ways to use the Management API for creating host object with R81 Management API. Which one is NOT correct?

Using Web Services
Using Web Services
Using Mgmt_cli tool
Using Mgmt_cli tool
Using CLISH
Using CLISH
Using SmartConsole GUI console
Using SmartConsole GUI console
Events are collected with SmartWorkflow from Trouble Ticket systems
Events are collected with SmartWorkflow from Trouble Ticket systems
Suggested answer: E
Explanation:

There are four ways to use the Management API for creating host object with R81 Management API: Using Web Services, Using mgmt_cli tool, Using CLISH, and Using SmartConsole GUI console. Events are collected with SmartWorkflow from Trouble Ticket systems is not a correct option.Reference:Check Point Management APIs

asked 16/09/2024
Curl Pushover
29 questions

Question 42

Report Export Collapse

CoreXL is supported when one of the following features is enabled:

Route-based VPN
Route-based VPN
IPS
IPS
IPv6
IPv6
Overlapping NAT
Overlapping NAT
Suggested answer: B
Explanation:

CoreXL is supported when one of the following features is enabled: IPS. CoreXL does not support Check Point Suite with these features: Route-based VPN, IPv6, Overlapping NAT, QoS, Content Awareness, Application Control, URL Filtering, Identity Awareness, HTTPS Inspection, DLP, Anti-Bot, Anti-Virus, Threat Emulation.Reference:CoreXL

asked 16/09/2024
Andrew Chan
41 questions

Question 43

Report Export Collapse

You noticed that CPU cores on the Security Gateway are usually 100% utilized and many packets were dropped. You don't have a budget to perform a hardware upgrade at this time. To optimize drops you decide to use Priority Queues and fully enable Dynamic Dispatcher. How can you enable them?

fw ctl multik dynamic_dispatching on
fw ctl multik dynamic_dispatching on
fw ctl multik dynamic_dispatching set_mode 9
fw ctl multik dynamic_dispatching set_mode 9
fw ctl multik set_mode 9
fw ctl multik set_mode 9
fw ctl multik pq enable
fw ctl multik pq enable
Suggested answer: C
Explanation:

To optimize drops you decide to use Priority Queues and fully enable Dynamic Dispatcher. You can enable them by using the command fw ctl multik set_mode 9. This command sets the SecureXL mode to 9, which means that Priority Queues are enabled and Dynamic Dispatcher is fully enabled.Reference:SecureXL Mechanism

asked 16/09/2024
Carlos Antonio Cardenas Lee
40 questions

Question 44

Report Export Collapse

Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidates management console. CPM allows the GUI client and management server to communicate via web services using ___________.

TCP port 19009
TCP port 19009
TCP Port 18190
TCP Port 18190
TCP Port 18191
TCP Port 18191
TCP Port 18209
TCP Port 18209
Suggested answer: A
Explanation:

Check Point Management (cpm) is the main management process that provides the architecture for a consolidated management console. CPM allows the GUI client and management server to communicate via web services using TCP port 19009 by default.Reference:CPM process

asked 16/09/2024
piera d'addelfio
37 questions

Question 45

Report Export Collapse

Which command is used to set the CCP protocol to Multicast?

cphaprob set_ccp multicast
cphaprob set_ccp multicast
cphaconf set_ccp multicast
cphaconf set_ccp multicast
cphaconf set_ccp no_broadcast
cphaconf set_ccp no_broadcast
cphaprob set_ccp no_broadcast
cphaprob set_ccp no_broadcast
Suggested answer: B
Explanation:

The cphaconf set_ccp multicast command is used to set the Cluster Control Protocol (CCP) to Multicast mode. This mode allows cluster members to communicate with each other using multicast packets. The other commands are either incorrect or set the CCP to Broadcast mode.Reference:ClusterXL Administration Guide

asked 16/09/2024
Rico Banagale
44 questions

Question 46

Report Export Collapse

Which packet info is ignored with Session Rate Acceleration?

source port ranges
source port ranges
source ip
source ip
source port
source port
same info from Packet Acceleration is used
same info from Packet Acceleration is used
Suggested answer: C
Explanation:

Session Rate Acceleration is a SecureXL feature that accelerates the establishment of new connections by bypassing the inspection of the first packet of each session. Session Rate Acceleration ignores the source port information of the packet, as well as the destination port ranges, protocol type, and VPN information. The other packet info is used by Packet Acceleration, which is another SecureXL feature that accelerates the forwarding of subsequent packets of an established connection.Reference:SecureXL Mechanism

asked 16/09/2024
koffi .J N tsudze
41 questions

Question 47

Report Export Collapse

Which is the least ideal Synchronization Status for Security Management Server High Availability deployment?

Synchronized
Synchronized
Never been synchronized
Never been synchronized
Lagging
Lagging
Collision
Collision
Suggested answer: D
Explanation:

The least ideal Synchronization Status for Security Management Server High Availability deployment is Collision. This status indicates that both members have modified the same object independently, resulting in a conflict that needs to be resolved manually. The other statuses are either normal or indicate a temporary delay in synchronization.Reference:High Availability Administration Guide

asked 16/09/2024
Naing Thet
46 questions

Question 48

Report Export Collapse

During inspection of your Threat Prevention logs you find four different computers having one event each with a Critical Severity. Which of those hosts should you try to remediate first?

Host having a Critical event found by Threat Emulation
Host having a Critical event found by Threat Emulation
Host having a Critical event found by IPS
Host having a Critical event found by IPS
Host having a Critical event found by Antivirus
Host having a Critical event found by Antivirus
Host having a Critical event found by Anti-Bot
Host having a Critical event found by Anti-Bot
Suggested answer: D
Explanation:

The host having a Critical event found by Anti-Bot should be remediated first, as it indicates that the host is infected by a botnet malware that is communicating with a Command and Control server. This poses a serious threat to the network security and data integrity. The other events may indicate potential malware infection or attack attempts, but not necessarily successful ones.Reference:Threat Prevention Administration Guide

asked 16/09/2024
Luis Elola
32 questions

Question 49

Report Export Collapse

In R81 spoofing is defined as a method of:

Disguising an illegal IP address behind an authorized IP address through Port Address Translation.
Disguising an illegal IP address behind an authorized IP address through Port Address Translation.
Hiding your firewall from unauthorized users.
Hiding your firewall from unauthorized users.
Detecting people using false or wrong authentication logins
Detecting people using false or wrong authentication logins
Making packets appear as if they come from an authorized IP address.
Making packets appear as if they come from an authorized IP address.
Suggested answer: D
Explanation:

In R81, spoofing is defined as a method of making packets appear as if they come from an authorized IP address. Spoofing can be used by attackers to bypass security policies or hide their identity. Check Point firewalls use anti-spoofing mechanisms to prevent spoofed packets from entering or leaving the network.Reference:Security Gateway R81 Administration Guide:

asked 16/09/2024
Joseph Varghese
44 questions

Question 50

Report Export Collapse

Connections to the Check Point R81 Web API use what protocol?

HTTPS
HTTPS
RPC
RPC
VPN
VPN
SIC
SIC
Suggested answer: A
Explanation:

Connections to the Check Point R81 Web API use the HTTPS protocol. The Web API is a RESTful web service that allows you to perform management tasks on the Security Management Server using HTTP requests.Reference:Check Point Management APIs

asked 16/09/2024
Louis Perriot
47 questions
Total 626 questions
Go to page: of 63