ExamGecko
Home Home / Checkpoint / 156-315.81

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 51

Question list
Search
Search

Bob is asked by Alice to disable the SecureXL mechanism temporary tor further diagnostic by their Check Point partner. Which of the following Check Point Command is true:

A.
fwaccel suspend
A.
fwaccel suspend
Answers
B.
fwaccel standby
B.
fwaccel standby
Answers
C.
fwaccel off
C.
fwaccel off
Answers
D.
fwaccel templates
D.
fwaccel templates
Answers
Suggested answer: C

Explanation:

You can disable the SecureXL mechanism temporarily for further diagnostic by runningfwaccel offon the Security Gateway1.This command disables SecureXL, which is an acceleration solution that maximizes the performance of the Firewall by offloading CPU-intensive operations to the SecureXL device2.Disabling SecureXL can help you troubleshoot connectivity or policy issues, as it forces all traffic to go through the Firewall kernel and bypass the SecureXL device1.To run this command, you need to access the Security Gateway in expert mode and runfwaccel off1.To enable SecureXL again, you can runfwaccel on1.Note that disabling SecureXL may affect the performance of the Security Gateway, so use it with caution and only when necessary1.

You had setup the VPN Community VPN-Stores'with 3 gateways. There are some issues with one remote gateway(1.1.1.1) and an your local gateway. What will be the best log filter to see only the IKE Phase 2 agreed networks for both gateways

A.
action:'Key Install' AND 1.1.1.1 AND Main Mode
A.
action:'Key Install' AND 1.1.1.1 AND Main Mode
Answers
B.
action:'Key Install- AND 1.1.1.1 ANDQuick Mode
B.
action:'Key Install- AND 1.1.1.1 ANDQuick Mode
Answers
C.
Blade:'VPN' AND VPN-Stores AND Main Mode
C.
Blade:'VPN' AND VPN-Stores AND Main Mode
Answers
D.
Blade:'VPN' AND VPN-Stores AND Quick Mode
D.
Blade:'VPN' AND VPN-Stores AND Quick Mode
Answers
Suggested answer: B

Explanation:

The best log filter to see only the IKE Phase 2 agreed networks for both gateways is B.action:''Key Install'' AND 1.1.1.1 AND Quick Mode1.This filter will show you the logs that indicate the successful establishment of IKE Phase 2, which is also known as Quick Mode2.In this phase, the Security Gateway and the remote gateway negotiate the IPSec Security Associations (SAs) and exchange the encryption keys for the VPN tunnel2.The action:''Key Install'' field shows that the SAs were installed successfully3.The 1.1.1.1 field shows that the logs are related to the remote gateway with that IP address3.The Quick Mode field shows that the logs are related to IKE Phase 2, as opposed to Main Mode, which is IKE Phase 13.To use this filter, you need to go to SmartConsole, open SmartLog, and enter the filter expression in the search box3.

Besides fw monitor, what is another command that can be used to capture packets?

A.
arp
A.
arp
Answers
B.
traceroute
B.
traceroute
Answers
C.
tcpdump
C.
tcpdump
Answers
D.
ping
D.
ping
Answers
Suggested answer: C

Explanation:

Tcpdump is a tool that captures and analyzes network traffic on a given interface2.It can be used to troubleshoot connectivity or performance issues, or to inspect the content of the packets2.To use tcpdump, you need to access the Security Gateway in expert mode and runtcpdump -i <interface> [options] [filter]2.You can specify various options and filters to customize the output, such as source or destination IP address, port number, protocol, packet size, etc2.You can also save the captured packets to a file for later analysis by using the-woption2.For more information about tcpdump, you can runman tcpdumpor visit the official website3.

What are the modes of SandBlast Threat Emulation deployment?

A.
Cloud, Smart-1 and Hybrid
A.
Cloud, Smart-1 and Hybrid
Answers
B.
Cloud. OpenServer and Vmware
B.
Cloud. OpenServer and Vmware
Answers
C.
Cloud, Appliance and Private
C.
Cloud, Appliance and Private
Answers
D.
Cloud, Appliance and Hybrid
D.
Cloud, Appliance and Hybrid
Answers
Suggested answer: D

Explanation:

SandBlast Threat Emulation is a technology that protects against zero-day and unknown malware by inspecting files in a secure sandbox environment and emulating their behavior.SandBlast Threat Emulation can be deployed in three modes: Cloud, Appliance and Hybrid1.

Cloud mode: The files are sent to the Check Point cloud service for emulation. This mode does not require any additional hardware or software installation. It is the easiest and most cost-effective way to deploy SandBlast Threat Emulation.

Appliance mode: The files are sent to a dedicated appliance (TE1000X, TE2500X, or TE100X) for emulation. This mode provides the highest level of performance and scalability, as well as data privacy and compliance. It is suitable for large organizations with high security and throughput requirements.

Hybrid mode: The files are first sent to the Check Point cloud service for emulation, and if the cloud service cannot determine the verdict, they are then sent to a dedicated appliance for further analysis. This mode combines the benefits of both cloud and appliance modes, offering fast response time and high accuracy.

Which command lists firewall chain?

A.
fwctl chain
A.
fwctl chain
Answers
B.
fw list chain
B.
fw list chain
Answers
C.
fw chain module
C.
fw chain module
Answers
D.
fw tab -t chainmod
D.
fw tab -t chainmod
Answers
Suggested answer: A

Explanation:

The command that lists firewall chain isfw ctl chain1.This command displays the list of chain modules that are registered on the Security Gateway2.Chain modules are components of the Firewall kernel that inspect and process packets according to the security policy and other features3.The order of the chain modules determines the order of the packet inspection and processing3.Thefw ctl chaincommand can help you troubleshoot connectivity or performance issues, or to verify that a feature is enabled or disabled on the Security Gateway2.To run this command, you need to access the Security Gateway in expert mode and runfw ctl chain1.

Which Queue in the Priority Queue has the maximum priority?

A.
High Priority
A.
High Priority
Answers
B.
Control
B.
Control
Answers
C.
Routing
C.
Routing
Answers
D.
Heavy Data Queue
D.
Heavy Data Queue
Answers
Suggested answer: C

Explanation:

The Priority Queue is a feature that allows the firewall to prioritize certain types of traffic over others, such as control and routing traffic, when the CPU load is high.The Priority Queue has four levels of priority: Control, Routing, High Priority and Heavy Data Queue1. The Control level has the highest priority and is reserved for firewall control traffic, such as policy installation and synchronization. The Routing level has the second highest priority and is used for routing protocols, such as OSPF and BGP. The High Priority level has the third highest priority and is used for user-defined traffic that needs to be prioritized, such as VoIP or video conferencing.The Heavy Data Queue level has the lowest priority and is used for bulk data transfer, such as FTP or HTTP2. Therefore, the correct answer is C.

What is the purpose of the command 'ps aux | grep twd'?

A.
You can check the Process ID and the processing time of the twd process.
A.
You can check the Process ID and the processing time of the twd process.
Answers
B.
You can convert the log file into Post Script format.
B.
You can convert the log file into Post Script format.
Answers
C.
You can list all Process IDs for all running services.
C.
You can list all Process IDs for all running services.
Answers
D.
You can check whether the IPS default setting is set to Detect or Prevent mode
D.
You can check whether the IPS default setting is set to Detect or Prevent mode
Answers
Suggested answer: A

Explanation:

The command ''ps aux | grep twd'' is used to check the process ID and the processing time of the twd process on the Security Gateway. The ps command displays information about the active processes on the system. The aux option shows all processes for all users, including those without a controlling terminal.The grep command filters the output of the ps command by searching for the pattern ''twd'', which is the name of the process that handles VPN traffic encryption and decryption1.The output of the command shows the process ID, CPU usage, memory usage, start time, and other details of the twd process2. Therefore, the correct answer is A.

What is the minimum number of CPU cores required to enable CoreXL?

A.
1
A.
1
Answers
B.
6
B.
6
Answers
C.
2
C.
2
Answers
D.
4
D.
4
Answers
Suggested answer: C

Explanation:

CoreXL is a technology that improves the performance of the Security Gateway by utilizing multiple CPU cores for processing traffic. CoreXL creates multiple instances of the firewall kernel (fwk) that run in parallel on different CPU cores.The number of kernel instances can be configured using the cpconfig command on the Security Gateway3.The minimum number of CPU cores required to enable CoreXL is 2, as one core is reserved for SND (Secure Network Distributor) and one core is used for running a kernel instance4. If the Security Gateway has only one CPU core, CoreXL cannot be enabled. Therefore, the correct answer is C.

You want to gather data and analyze threats to your mobile device. It has to be a lightweight app. Which application would you use?

A.
Check Point Capsule Cloud
A.
Check Point Capsule Cloud
Answers
B.
Sandblast Mobile Protect
B.
Sandblast Mobile Protect
Answers
C.
SecuRemote
C.
SecuRemote
Answers
D.
SmartEvent Client Info
D.
SmartEvent Client Info
Answers
Suggested answer: B

Explanation:

SandBlast Mobile Protect is an application that provides comprehensive protection for mobile devices against cyber threats. SandBlast Mobile Protect is a lightweight app that does not affect the device performance or battery life.It monitors network traffic, device behavior, and installed apps to detect and prevent attacks such as phishing, malware, ransomware, botnets, and man-in-the-middle5.SandBlast Mobile Protect also integrates with Check Point's ThreatCloud intelligence network to provide real-time threat information and updates6. Therefore, the correct answer is B)

Secure Configuration Verification (SCV), makes sure that remote access client computers are configured in accordance with the enterprise Security Policy. Bob was asked by Alice to implement a specific SCV configuration but therefore Bob needs to edit and configure a specific Check Point file. Which location file and directory is true?

A.
$FWDIR/conf/client.scv
A.
$FWDIR/conf/client.scv
Answers
B.
$CPDIR/conf/local.scv
B.
$CPDIR/conf/local.scv
Answers
C.
$CPDIR/conf/client.svc
C.
$CPDIR/conf/client.svc
Answers
D.
$FWDIR/conf/local.scv
D.
$FWDIR/conf/local.scv
Answers
Suggested answer: D

Explanation:

Secure Configuration Verification (SCV) is a feature that allows the Mobile Access Gateway to check the compliance of remote access clients with the enterprise security policy before granting them access to internal resources.SCV checks can be defined in a file named local.scv, which is located in the $FWDIR/conf directory on the Mobile Access Gateway1.The file can be edited manually or using the SCV Editor tool2. Therefore, the correct answer is D)

Total 626 questions
Go to page: of 63