ExamGecko
Home Home / Checkpoint / 156-315.81

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 52

Question list
Search
Search

List of questions

Search

What are the services used for Cluster Synchronization?

A.
256H-CP tor Full Sync and 8116/UDP for Delta Sync
A.
256H-CP tor Full Sync and 8116/UDP for Delta Sync
Answers
B.
8116/UDP for Full Sync and Delta Sync
B.
8116/UDP for Full Sync and Delta Sync
Answers
C.
TCP/256 for Full Sync and Delta Sync
C.
TCP/256 for Full Sync and Delta Sync
Answers
D.
No service needed when using Broadcast Mode
D.
No service needed when using Broadcast Mode
Answers
Suggested answer: A

Explanation:

Cluster Synchronization is a mechanism that allows cluster members to share state information and maintain a consistent security policy. Cluster Synchronization uses two types of synchronization: Full Synchronization and Delta Synchronization. Full Synchronization transfers the entire Security Policy and state tables from one cluster member to another. Delta Synchronization transfers only the changes in the state tables.Cluster Synchronization uses two services for communication: TCP port 256 (CPHA) for Full Synchronization and UDP port 8116 for Delta Synchronization3. Therefore, the correct answer is A.

Due to high CPU workload on the Security Gateway, the security administrator decided to purchase a new multicore CPU to replace the existing single core CPU. After installation, is the administrator required to perform any additional tasks?

A.
After upgrading the hardware, increase the number of kernel instances using cpconfig
A.
After upgrading the hardware, increase the number of kernel instances using cpconfig
Answers
B.
Hyperthreading must be enabled in the bios to use CoreXL
B.
Hyperthreading must be enabled in the bios to use CoreXL
Answers
C.
Run cprestart from dish
C.
Run cprestart from dish
Answers
D.
Administrator does not need to perform any task. Check Point will make use of the newly installed CPU and Cores.
D.
Administrator does not need to perform any task. Check Point will make use of the newly installed CPU and Cores.
Answers
Suggested answer: A

Explanation:

https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_PerformanceTuning_AdminGuide/Content/Topics-PTG/CoreXL-Configuring-IPv4-and-IPv6-CoreXL-FW-instances.htm?Highlight=Configuring%20the%20Number%20of%20IPv4%20CoreXL%20Firewall%20Instances R81 https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_PerformanceTuning_AdminGuide/Topics-PTG/CoreXL-Configuring-IPv4-and-IPv6-CoreXL-FW-instances.htm cpconfig -> Enter the number of the Check Point CoreXL option. ( Enter 1 to select Change the number of firewall instances. OR Enter 2 for the option Change the number of IPv6 firewall instances.) -> Enter the total number of IPv4 (IPv6) CoreXL Firewall instances you wish the Security Gateway to run. Follow the instructions on the screen. -> Exit from the cpconfig menu. - Reboot the Security Gateway.

Mobile Access Gateway can be configured as a reverse proxy for Internal Web Applications Reverse proxy users browse to a URL that is resolved to the Security Gateway IP address. Which of the following Check Point command is true for enabling the Reverse Proxy:

A.
ReverseCLIProxy
A.
ReverseCLIProxy
Answers
B.
ReverseProxyCLI
B.
ReverseProxyCLI
Answers
C.
ReverseProxy
C.
ReverseProxy
Answers
D.
ProxyReverseCLI
D.
ProxyReverseCLI
Answers
Suggested answer: C

Explanation:

Mobile Access Gateway can be configured as a reverse proxy for internal web applications. Reverse proxy users browse to a URL that is resolved to the Security Gateway IP address. The Security Gateway then forwards the requests to the internal web servers and returns the responses to the users.To enable reverse proxy mode on the Mobile Access Gateway, the administrator needs to run the ReverseProxy command on the command line interface of the Security Gateway5. Therefore, the correct answer is C.

What should the admin do in case the Primary Management Server is temporary down?

A.
Use the VIP in SmartConsole you always reach the active Management Server.
A.
Use the VIP in SmartConsole you always reach the active Management Server.
Answers
B.
The Secondary will take over automatically Change the IP in SmartConsole to logon to the private IP of the Secondary Management Server.
B.
The Secondary will take over automatically Change the IP in SmartConsole to logon to the private IP of the Secondary Management Server.
Answers
C.
Run the 'promote_util' to activate the Secondary Management server
C.
Run the 'promote_util' to activate the Secondary Management server
Answers
D.
Logon with SmartConsole to the Secondary Management Server and choose 'Make Active' under Actions in the HA Management Menu
D.
Logon with SmartConsole to the Secondary Management Server and choose 'Make Active' under Actions in the HA Management Menu
Answers
Suggested answer: A

Explanation:

High Availability (HA) is a deployment scenario where two or more Security Management Servers are configured to work together as a cluster. One server acts as the Primary server and handles all management operations, while another server acts as the Secondary server and serves as a backup. If the Primary server fails, the Secondary server takes over and becomes active. The cluster members communicate using a Virtual IP (VIP) address, which is used by SmartConsole to connect to the active server. If the Primary server is temporarily down, the administrator does not need to do anything, as SmartConsole will automatically connect to the VIP address and reach the Secondary server that has become active. Therefore, the correct answer is A.

According to the policy installation flow the transfer state (CPTA) is responsible for the code generated by the FWM. On the Security Gateway side a process receives them and first stores them Into a temporary directory. Which process is true for receiving these Tiles;

A.
FWD
A.
FWD
Answers
B.
CPD
B.
CPD
Answers
C.
FWM
C.
FWM
Answers
D.
RAD
D.
RAD
Answers
Suggested answer: A

Explanation:

FWD is a process that runs on both Security Management Server and Security Gateway. On Security Management Server, FWD handles logging and communication with SmartConsole.On Security Gateway, FWD receives policy files from FWM (the policy compiler process on Security Management Server) and stores them in a temporary directory before installing them on the firewall kernel7. Therefore, FWD is responsible for receiving policy files from FWM on Security Gateway side. The correct answer is A.

The customer has about 150 remote access user with a Windows laptops. Not more than 50 Clients will be connected at the same time. The customer want to use multiple VPN Gateways as entry point and a personal firewall. What will be the best license for him?

A.
He will need Capsule Connect using MEP (multiple entry points).
A.
He will need Capsule Connect using MEP (multiple entry points).
Answers
B.
Because the customer uses only Windows clients SecuRemote will be sufficient and no additional license is needed
B.
Because the customer uses only Windows clients SecuRemote will be sufficient and no additional license is needed
Answers
C.
He will need Harmony Endpoint because of the personal firewall.
C.
He will need Harmony Endpoint because of the personal firewall.
Answers
D.
Mobile Access license because he needs only a 50 user license, license count is per concurrent user.
D.
Mobile Access license because he needs only a 50 user license, license count is per concurrent user.
Answers
Suggested answer: C

Explanation:

Harmony Endpoint is a solution that provides comprehensive protection for endpoint devices against cyber threats. Harmony Endpoint includes a personal firewall that controls the network traffic to and from the endpoint device, based on predefined rules and policies.Harmony Endpoint also integrates with Check Point's VPN solutions to provide secure remote access to corporate resources1. Therefore, the customer will need Harmony Endpoint because of the personal firewall requirement.

Bob has finished io setup provisioning a secondary security management server. Now he wants to check if the provisioning has been correct. Which of the following Check Point command can be used to check if the security management server has been installed as a primary or a secondary security management server?

A.
cpprod_util MgmtlsPrimary
A.
cpprod_util MgmtlsPrimary
Answers
B.
cpprod_util FwlsSecondary
B.
cpprod_util FwlsSecondary
Answers
C.
cpprod_util MgmtlsSecondary
C.
cpprod_util MgmtlsSecondary
Answers
D.
cpprod_util FwlsPrimary
D.
cpprod_util FwlsPrimary
Answers
Suggested answer: A

Explanation:

The cpprod_util command is a utility that provides information about the installed Check Point products and their versions.The cpprod_util MgmtIsPrimary option checks if the Security Management Server is installed as a primary or a secondary server in a High Availability cluster2. If the server is primary, the command returns ''yes''. If the server is secondary, the command returns ''no''. Therefore, Bob can use this command to verify the provisioning of the secondary Security Management Server.

What are the three SecureXL Templates available in R81.20?

A.
PEP Templates. QoS Templates. VPN Templates
A.
PEP Templates. QoS Templates. VPN Templates
Answers
B.
Accept Templates. Drop Templates. NAT Templates
B.
Accept Templates. Drop Templates. NAT Templates
Answers
C.
Accept Templates. Drop Templates. Reject Templates
C.
Accept Templates. Drop Templates. Reject Templates
Answers
D.
Accept Templates. PDP Templates. PEP Templates
D.
Accept Templates. PDP Templates. PEP Templates
Answers
Suggested answer: B

Explanation:

SecureXL is a technology that improves the performance of the Security Gateway by offloading CPU-intensive operations to a dedicated hardware or software module. SecureXL uses templates to accelerate traffic processing based on predefined patterns and conditions.SecureXL supports three types of templates: Accept Templates, Drop Templates, and NAT Templates3.

Accept Templates are used to accelerate traffic that matches an Accept rule in the Security Policy. Accept Templates bypass most of the inspection stages and send packets directly to the network interface.

Drop Templates are used to accelerate traffic that matches a Drop rule in the Security Policy. Drop Templates drop packets without sending them to the firewall kernel for inspection.

NAT Templates are used to accelerate traffic that requires Network Address Translation (NAT). NAT Templates perform NAT operations without sending packets to the firewall kernel.

Therefore, the correct answer is B)

Which one is not a valid Package Option In the Web GUI for CPUSE?

A.
Clean Install
A.
Clean Install
Answers
B.
Export Package
B.
Export Package
Answers
C.
Upgrade
C.
Upgrade
Answers
D.
Database Conversion to R81.20 only
D.
Database Conversion to R81.20 only
Answers
Suggested answer: B

Explanation:

CPUSE (Check Point Upgrade Service Engine) is a tool that allows users to download, import, install, and uninstall software packages on Gaia OS. CPUSE has a web-based user interface that can be accessed through Gaia Portal.CPUSE offers four package options in the web GUI for different purposes4:

Clean Install - This option performs a clean installation of a Major Version package, which erases all existing configuration and data on the system.

Export Package - This option exports a package from CPUSE repository to an external location for backup or transfer purposes.

Upgrade - This option performs an upgrade of a Major Version package or a Minor Version package, which preserves the existing configuration and data on the system.

Database Conversion - This option converts the database schema of a Major Version package to match the current version.

Therefore, the correct answer is B)

Alice knows about the Check Point Management HA installation from Bob and needs to know which Check Point Security Management Server is currently capable of issuing and managing certificate. Alice uses the Check Point command 'cpconfig'' to run the Check Point Security Management Server configuration tool on both Check Point Management HA instances 'Primary & Secondary' Which configuration option does she need to look for:

A.
Certificate's Fingerprint
A.
Certificate's Fingerprint
Answers
B.
Random Pool
B.
Random Pool
Answers
C.
CA Authority
C.
CA Authority
Answers
D.
Certificate Authority
D.
Certificate Authority
Answers
Suggested answer: D

Explanation:

Certificate Authority (CA) is a service that issues and manages digital certificates for secure communication between Check Point components. CA can be installed on a Security Management Server or on a dedicated server. CA can be configured as primary or secondary in a High Availability cluster. The cpconfig command is used to run the Check Point Configuration Tool on Gaia OS, which allows users to configure various settings for Check Point products.One of the configuration options is Certificate Authority, which shows if CA is installed on the server and if it is primary or secondary5. Therefore, Alice needs to look for this option to check the CA status.

Total 626 questions
Go to page: of 63