ExamGecko
Home Home / Checkpoint / 156-315.81

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 50

Question list
Search
Search

A user complains that some Internet resources are not available. The Administrator is having issues seeing it packets are being dropped at the firewall (not seeing drops in logs). What is the solution to troubleshoot the issue?

A.
run fw unloadlocal' on the relevant gateway and check the ping again
A.
run fw unloadlocal' on the relevant gateway and check the ping again
Answers
B.
run 'cpstop' on the relevant gateway and check the ping again
B.
run 'cpstop' on the relevant gateway and check the ping again
Answers
C.
run ''fw log' on the relevant gateway
C.
run ''fw log' on the relevant gateway
Answers
D.
run ''fw ctl zdebug drop' on the relevant gateway
D.
run ''fw ctl zdebug drop' on the relevant gateway
Answers
Suggested answer: D

Explanation:

The solution to troubleshoot the issue of some Internet resources being unavailable is to runfw ctl zdebug dropon the relevant gateway1.This command lists all dropped packets in real time and explains the reasons for the drop2.It is a powerful tool that can help diagnose connectivity problems and firewall policy issues3.To use this command, you need to access the gateway in expert mode and runfw ctl zdebug + drop2.You can also filter the output by using grep with an IP address or a keyword, for example:fw ctl zdebug + drop | grep 10.10.10.10orfw ctl zdebug + drop | grep SYN3.This command is a wrapper for the full debugs, and it will run the debug commands for you and will allow you to run debug from one debug module only4.By default, it will use a small debug buffer but if you wish, you can provide the-bufoption to use your own size4.To stop the command, press Ctrl+C and then runfw ctl debug 0to reset the debug state3.

Note: Running this command may affect the performance of the firewall, so use it with caution and only when necessary3.

Reference:Solved: is it possible /supported to run fw ctl zdebug on ... - Check ...,How to use the fw ctl zdebug command to view drops on the Security Gateway,Troubleshooting dropped packets in Checkpoint using zdebug,''fw ctl zdebug'' - Helpful Command Combinations - Check Point CheckMates

What are possible Automatic Reactions in SmartEvent?

A.
Mail. SNMP Trap, Block Source. Block Event Activity, External Script
A.
Mail. SNMP Trap, Block Source. Block Event Activity, External Script
Answers
B.
Web Mail. Block Destination, SNMP Trap. SmartTask
B.
Web Mail. Block Destination, SNMP Trap. SmartTask
Answers
C.
Web Mail, Block Service. SNMP Trap. SmartTask, Geo Protection
C.
Web Mail, Block Service. SNMP Trap. SmartTask, Geo Protection
Answers
D.
Web Mail, Forward to SandBlast Appliance, SNMP Trap, External Script
D.
Web Mail, Forward to SandBlast Appliance, SNMP Trap, External Script
Answers
Suggested answer: A

Explanation:

The possible Automatic Reactions in SmartEvent areMail, SNMP Trap, Block Source, Block Event Activity, and External Script1.Automatic Reactions are actions that SmartEvent can perform automatically when a specific event occurs2.They can help you respond quickly and efficiently to security incidents and threats2.The Automatic Reactions are1:

Mail: This reaction sends an email notification to a specified recipient with the details of the event. You can customize the subject and the body of the email, and use variables to include relevant information.

SNMP Trap: This reaction sends an SNMP trap to a specified SNMP server with the details of the event. You can customize the OID and the community string of the trap, and use variables to include relevant information.

Block Source: This reaction blocks the source IP address of the event from accessing your network for a specified duration. You can choose to block the source on all gateways or on specific gateways. You can also choose to block the source on a specific port or service.

Block Event Activity: This reaction blocks the specific activity that triggered the event from occurring again for a specified duration. You can choose to block the activity on all gateways or on specific gateways. You can also choose to block the activity on a specific port or service.

External Script: This reaction runs an external script on a specified server with the details of the event as arguments. You can use any script that can be executed by the operating system of the server, such as bash, perl, python, etc. You can use variables to include relevant information in the script arguments.

Which of the following processes pulls the application monitoring status from gateways?

A.
cpd
A.
cpd
Answers
B.
cpwd
B.
cpwd
Answers
C.
cpm
C.
cpm
Answers
D.
fwm
D.
fwm
Answers
Suggested answer: A

Explanation:

The process that pulls the application monitoring status from gateways iscpd1.The cpd process is responsible for the communication between the Security Management Server and the Security Gateway2.It handles tasks such as policy installation, status reporting, logging, and synchronization2.The cpd process also monitors the application status of the Security Gateway, such as CPU, memory, disk space, and processes3.The cpd process sends this information to the Security Management Server, which displays it in SmartConsole and SmartView Monitor3.

Which of the following statements about SecureXL NAT Templates is true?

A.
NAT Templates are generated to achieve high session rate for NAT. These templates store the NAT attributes of connections matched by rulebase so that similar new connections can take advantage of this information and do NAT without the expensive rulebase lookup. These are enabled by default and work only if Accept Templates are enabled.
A.
NAT Templates are generated to achieve high session rate for NAT. These templates store the NAT attributes of connections matched by rulebase so that similar new connections can take advantage of this information and do NAT without the expensive rulebase lookup. These are enabled by default and work only if Accept Templates are enabled.
Answers
B.
DROP Templates are generated to achieve high session rate for NAT. These templates store the NAT attributes of connections matched by rulebase so that similar new connections can take advantage of this information and do NAT without the expensive rulebase lookup. These are disabled by default and work only if NAT Templates are disabled.
B.
DROP Templates are generated to achieve high session rate for NAT. These templates store the NAT attributes of connections matched by rulebase so that similar new connections can take advantage of this information and do NAT without the expensive rulebase lookup. These are disabled by default and work only if NAT Templates are disabled.
Answers
C.
NAT Templates are generated to achieve high session rate for NAT. These templates store the NAT attributes of connections matched by rulebase so that similar new connections can take advantage of this information and do NAT without the expensive rulebase lookup. These are disabled by default and work only if Accept Templates are disabled.
C.
NAT Templates are generated to achieve high session rate for NAT. These templates store the NAT attributes of connections matched by rulebase so that similar new connections can take advantage of this information and do NAT without the expensive rulebase lookup. These are disabled by default and work only if Accept Templates are disabled.
Answers
D.
ACCEPT Templates are generated to achieve high session rate for NAT. These templates store the NAT attributes of connections matched by rulebase so that similar new connections can take advantage of this information and do NAT without the expensive rulebase lookup. These are disabled by default and work only if NAT Templates are disabled.
D.
ACCEPT Templates are generated to achieve high session rate for NAT. These templates store the NAT attributes of connections matched by rulebase so that similar new connections can take advantage of this information and do NAT without the expensive rulebase lookup. These are disabled by default and work only if NAT Templates are disabled.
Answers
Suggested answer: A

Explanation:

NAT Templates are generated to achieve high session rate for NAT. These templates store the NAT attributes of connections matched by rulebase so that similar new connections can take advantage of this information and do NAT without the expensive rulebase lookup.These are enabled by default and work only if Accept Templates are enabled1.According to the web search results, NAT Templates are a feature of SecureXL that accelerates the performance of the Security Gateway by offloading CPU-intensive operations to the SecureXL device2.NAT Templates are supported for Static NAT and Hide NAT using the existing SecureXL Templates mechanism1.NAT Templates are disabled by default on Check Point Security Gateway R80.10 and below, but they are not relevant to SecureXL in versions R80.20 and above, as all template handling has moved to the Firewall1.NAT Templates can be enabled or disabled by setting the relevant kernel parameters in $FWDIR/boot/modules/fwkern.conf file1.

Is it possible to establish a VPN before the user login to the Endpoint Client?

A.
yes, you had to set neo_remember_user_password to true in the trac.defaults of the Remote Access Client or you can use the endpoint_vpn_remember_user_password attribute in the trac_client_1 .ttm file located in the SFWDIR/conf directory on the Security Gateway
A.
yes, you had to set neo_remember_user_password to true in the trac.defaults of the Remote Access Client or you can use the endpoint_vpn_remember_user_password attribute in the trac_client_1 .ttm file located in the SFWDIR/conf directory on the Security Gateway
Answers
B.
no, the user must login first.
B.
no, the user must login first.
Answers
C.
yes. you had to set neo_always_connected to true in the trac.defaults of the Remote Access Client or you can use the endpoint_vpn_always_connected attribute in the trac_client_1 .ttm file located in the SFWDIR/conf directory on the Security Gateway
C.
yes. you had to set neo_always_connected to true in the trac.defaults of the Remote Access Client or you can use the endpoint_vpn_always_connected attribute in the trac_client_1 .ttm file located in the SFWDIR/conf directory on the Security Gateway
Answers
D.
yes, you had to enable Machine Authentication in the Gateway object of the Smart Console
D.
yes, you had to enable Machine Authentication in the Gateway object of the Smart Console
Answers
Suggested answer: D

Explanation:

You can establish a VPN before the user login to the Endpoint Client by enabling Machine Authentication in the Gateway object of the Smart Console1.Machine Authentication is a feature that allows you to authenticate with a machine certificate and establish a VPN tunnel before the Windows Logon2.This feature provides the following benefits2:

It enhances the security of the VPN connection by verifying the identity of the machine before allowing access to the network.

It simplifies the user experience by eliminating the need to enter credentials twice (once for the VPN and once for the Windows Logon).

It enables seamless connectivity to the network resources and domain services, such as Group Policy, login scripts, and mapped drives. Machine Authentication is supported on Check Point Endpoint Security Client for Windows with E80.71 and higher versions2.It requires a hotfix on top of R77.30 jumbo 286 on the Security Gateway2.To configure Machine Authentication, you need to do the following steps2:

Generate and distribute machine certificates to the Endpoint machines using a trusted Certificate Authority (CA).

Enable Machine Authentication in the Gateway object of the Smart Console and select the CA that issued the machine certificates.

Install policy on the Security Gateway and reboot it.

Enable Machine Authentication in the Endpoint Security Client and select the machine certificate to use.

After having saved the Clish Configuration with the 'save configuration config.txt' command, where can you find the config.txt file?

A.
You will find it in the home directory of your user account (e.g. /home/admin/)
A.
You will find it in the home directory of your user account (e.g. /home/admin/)
Answers
B.
You can locate the file via SmartConsole > Command Line.
B.
You can locate the file via SmartConsole > Command Line.
Answers
C.
You have to launch the WebUI and go to 'Config' -> 'Export Config File' and specifiy the destination directory of your local file system.
C.
You have to launch the WebUI and go to 'Config' -> 'Export Config File' and specifiy the destination directory of your local file system.
Answers
D.
You cannot locate the file in the file system since Clish does not have any access to the bash file system
D.
You cannot locate the file in the file system since Clish does not have any access to the bash file system
Answers
Suggested answer: A

Explanation:

You will find the config.txt file in the home directory of your user account (e.g./home/admin/)1.Thesave configuration config.txtcommand is a Clish command that saves the current Gaia configuration to a text file2.The file is stored in the home directory of the user who executed the command, and it can be accessed by using thecatorlesscommands in expert mode1.The file can also be transferred to another machine by using thescporsftpcommands1.The config.txt file contains the Clish commands that are needed to restore the Gaia configuration to the same state as when the file was saved2.The file can be used for backup, migration, or troubleshooting purposes2.

How can you switch the active log file?

A.
Run fw logswitch on the gateway
A.
Run fw logswitch on the gateway
Answers
B.
Run fwm logswitch on the Management Server
B.
Run fwm logswitch on the Management Server
Answers
C.
Run fwm logswitch on the gateway
C.
Run fwm logswitch on the gateway
Answers
D.
Run fw logswitch on the Management Server
D.
Run fw logswitch on the Management Server
Answers
Suggested answer: D

Explanation:

You can switch the active log file by runningfw logswitchon the Management Server1.This command closes the current log file and creates a new one2.It is useful for archiving or backing up log files, or for creating a new log file for a specific time period2.You can also schedule the log switch to occur automatically at a regular interval, such as daily, weekly, or monthly2.To run this command, you need to access the Management Server in expert mode and runfw logswitch1. You can also use the SmartView Tracker to switch the active log file from the GUI.To do this, go to the Network & Endpoint tab, click on the File menu, and select Switch Active File...3.

Which of the following Check Point commands is true to enable Multi-Version Cluster (MVC)?

A.
Check Point Security Management HA (Secondary): set cluster member mvc on
A.
Check Point Security Management HA (Secondary): set cluster member mvc on
Answers
B.
Check Point Security Gateway Only: set cluster member mvc on
B.
Check Point Security Gateway Only: set cluster member mvc on
Answers
C.
Check Point Security Management HA (Primary): set cluster member mvc on
C.
Check Point Security Management HA (Primary): set cluster member mvc on
Answers
D.
Check Point Security Gateway Cluster Member: set cluster member mvc on
D.
Check Point Security Gateway Cluster Member: set cluster member mvc on
Answers
Suggested answer: D

Explanation:

You can enable Multi-Version Cluster (MVC) by runningset cluster member mvc onon the Check Point Security Gateway Cluster Member1.MVC is a feature that allows you to upgrade a Security Gateway Cluster to a higher version without downtime2.It works by upgrading one cluster member at a time, while the other cluster members continue to operate with the lower version2.MVC supports upgrading from R80.40 and above to R81 and above2.To use MVC, you need to do the following steps2:

Enable MVC on each cluster member by runningset cluster member mvc onin Clish and rebooting the gateway.

Install the higher version on one cluster member using CPUSE or ISO image.

Install policy on the upgraded cluster member and verify that it works properly.

Repeat the previous steps for the remaining cluster members until all of them are upgraded.

Disable MVC on each cluster member by runningset cluster member mvc offin Clish and rebooting the gateway.

Bob needs to know if Alice was configuring the new virtual cluster interface correctly. Which of the following Check Point commands is true?

A.
cphaprob-aif
A.
cphaprob-aif
Answers
B.
cp hap rob state
B.
cp hap rob state
Answers
C.
cphaprob list
C.
cphaprob list
Answers
D.
probcpha -a if
D.
probcpha -a if
Answers
Suggested answer: A

Explanation:

You can use thecphaprob -a ifcommand to check the status of the virtual cluster interface1.This command displays the state, virtual IP address, and physical IP address of each cluster interface2.It also shows the load balancing method, the load on each interface, and the active member for each interface2. This command can help you verify that Alice configured the virtual cluster interface correctly and that it is working properly.To run this command, you need to access the cluster member in Clish and runcphaprob -a if1.

What is the amount of Priority Queues by default?

A.
There are 8 priority queues and this number cannot be changed.
A.
There are 8 priority queues and this number cannot be changed.
Answers
B.
There is no distinct number of queues since it will be changed in a regular basis based on its system requirements.
B.
There is no distinct number of queues since it will be changed in a regular basis based on its system requirements.
Answers
C.
There are 7 priority queues by default and this number cannot be changed.
C.
There are 7 priority queues by default and this number cannot be changed.
Answers
D.
There are 8 priority queues by default, and up to 8 additional queues can be manually configured
D.
There are 8 priority queues by default, and up to 8 additional queues can be manually configured
Answers
Suggested answer: D

Explanation:

There are 8 priority queues by default, and up to 8 additional queues can be manually configured1.Priority Queues are a feature of SecureXL that accelerates the performance of the Security Gateway by offloading CPU-intensive operations to the SecureXL device2.Priority Queues are used to prioritize traffic when the Security Gateway is stressed and needs to drop packets2.By default, there are 8 priority queues, each with a different priority level and type of connections2.You can manually configure up to 8 additional queues by setting the relevant kernel parameters in $FWDIR/boot/modules/fwkern.conf file1.You can also customize the queue length, the load balancing method, and the services that are considered as control connections1.

Total 626 questions
Go to page: of 63