ExamGecko
Home Home / Checkpoint / 156-315.81

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 53

Question list
Search
Search

What API command below creates a new host object with the name 'My Host' and IP address of '192 168 0 10'?

A.
set host name 'My Host' ip-address '192.168.0.10'
A.
set host name 'My Host' ip-address '192.168.0.10'
Answers
B.
new host name 'My Host' ip-address '192 168.0.10'
B.
new host name 'My Host' ip-address '192 168.0.10'
Answers
C.
create host name 'My Host' ip-address '192.168 0.10'
C.
create host name 'My Host' ip-address '192.168 0.10'
Answers
D.
mgmt.cli -m <mgmt ip> add host name 'My Host' ip-address '192.168.0 10'
D.
mgmt.cli -m <mgmt ip> add host name 'My Host' ip-address '192.168.0 10'
Answers
Suggested answer: A

Explanation:

Check Point API is an interface that allows users to automate tasks and manage Check Point products using RESTful web service calls. Check Point API uses JSON format for requests and responses.To create a new host object with the name ''My Host'' and IP address of ''192.168.0.10'', users need to use the set host command with the name and ip-address parameters6. The command syntax is:

set host name ''My Host'' ip-address ''192.168.0.10''

Therefore, the correct answer is A.

What does Backward Compatibility mean upgrading the Management Server and how can you check it?

A.
The Management Server is able to manage older Gateways. The lowest supported version is documented in the Installation and Upgrade Guide
A.
The Management Server is able to manage older Gateways. The lowest supported version is documented in the Installation and Upgrade Guide
Answers
B.
The Management Server is able to manage older Gateways The lowest supported version is documented in the Release Notes
B.
The Management Server is able to manage older Gateways The lowest supported version is documented in the Release Notes
Answers
C.
You will be able to connect to older Management Server with the SmartConsole. The lowest supported version is documented in the Installation and Upgrade Guide
C.
You will be able to connect to older Management Server with the SmartConsole. The lowest supported version is documented in the Installation and Upgrade Guide
Answers
D.
You will be able to connect to older Management Server with the SmartConsole The lowest supported version is documented in the Release Notes
D.
You will be able to connect to older Management Server with the SmartConsole The lowest supported version is documented in the Release Notes
Answers
Suggested answer: B

Explanation:

Backward Compatibility means that the Management Server is able to manage older Gateways. The lowest supported version is documented in the Release Notes of each version. The Installation and Upgrade Guide only provides information about how to install or upgrade the Management Server and the Gateways, not about the compatibility between them.

Reference:Check Point R81 Release Notes, page 6.

The admin is connected via ssh lo the management server. He wants to run a mgmt_dl command but got a Error 404 message. To check the listening ports on the management he runs netstat with the results shown below. What can be the cause for the issue?

A.
Wrong Management API Access setting^for Ihe client IP To correct it go to SmartConsole / Management & Settings / Blades / Management API and press 'Advanced Settings..' and choose GUI clients or ALL IP's.
A.
Wrong Management API Access setting^for Ihe client IP To correct it go to SmartConsole / Management & Settings / Blades / Management API and press 'Advanced Settings..' and choose GUI clients or ALL IP's.
Answers
B.
The API didn't run on the default port check it with api status' and add '-port 4434' to the mgmt_clt command.
B.
The API didn't run on the default port check it with api status' and add '-port 4434' to the mgmt_clt command.
Answers
C.
The management permission in the user profile is mrssing. Go to SmartConsole / Management & Settings I Permissions & Administrators / Permission Profiles. Select the profile of the user and enable 'Management API Login' under Management Permissions
C.
The management permission in the user profile is mrssing. Go to SmartConsole / Management & Settings I Permissions & Administrators / Permission Profiles. Select the profile of the user and enable 'Management API Login' under Management Permissions
Answers
D.
The API is not running, the services shown by netstat are the gaia services. To start the API run 'api start'
D.
The API is not running, the services shown by netstat are the gaia services. To start the API run 'api start'
Answers
Suggested answer: D

Explanation:

The error message ''Error 404. The Management API server is not available. Please check that the Management API server is up and running.'' indicates that the API is not running on the Management Server. The netstat command shows that there is no process listening on port 4434, which is the default port for the API. To start the API, the command 'api start' should be used. The other options are not relevant to this issue.

Reference:Check Point R81 Installation and Upgrade Guide, page 18.

What is a possible command to delete all of the SSH connections of a gateway?

A.
fw sam -I dport 22
A.
fw sam -I dport 22
Answers
B.
fw ctl conntab -x -dpott=22
B.
fw ctl conntab -x -dpott=22
Answers
C.
fw tab -t connections -x -e 00000016
C.
fw tab -t connections -x -e 00000016
Answers
D.
fwaccel dos config set dport ssh
D.
fwaccel dos config set dport ssh
Answers
Suggested answer: A

Explanation:

The command 'fw sam -I dport 22' will delete all of the SSH connections of a gateway by adding a temporary rule to the Security Policy that blocks traffic with destination port 22. The other commands are not valid or do not have the same effect.

Reference:Check Point R81 Command Line Interface Reference Guide, page 101.

What are the two types of tests when using the Compliance blade?

A.
Policy-based tests and Global properties
A.
Policy-based tests and Global properties
Answers
B.
Global tests and Object-based tests
B.
Global tests and Object-based tests
Answers
C.
Access Control policy analysis and Threat Prevention policy analysis
C.
Access Control policy analysis and Threat Prevention policy analysis
Answers
D.
Tests conducted based on the loC XMfcfile and analysis of SOLR documents
D.
Tests conducted based on the loC XMfcfile and analysis of SOLR documents
Answers
Suggested answer: B

Explanation:

The Check Point Compliance Blade has a library of Check Point-defined tests to use as a baseline for good gateway and policy configuration. A Best Practice test is related to specified regulations in different regulatory standards. It describes compliance status and recommends corrective steps. Global Tests - Examine all applicable configuration settings in the organization. Object-based Tests - Examine the configuration settings for specified objects (gateways, profiles and other objects)

https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk120256

When performing a minimal effort upgrade, what will happen to the network traffic?

A.
All connections that were Initiated before the upgrade will be dropped, causing network downtime.
A.
All connections that were Initiated before the upgrade will be dropped, causing network downtime.
Answers
B.
All connections that were initiated before the upgrade will be handled by the active gateway
B.
All connections that were initiated before the upgrade will be handled by the active gateway
Answers
C.
All connections that were initiated before the upgrade will be handled normally
C.
All connections that were initiated before the upgrade will be handled normally
Answers
D.
All connections that were initiated before the upgrade will be handled by the standby gateway
D.
All connections that were initiated before the upgrade will be handled by the standby gateway
Answers
Suggested answer: B

Explanation:

All connections that were initiated before the upgrade will be handled by the active gateway.According to the Check Point documentation1, a minimal effort upgrade is a procedure that allows you to upgrade each Security Gateway individually, without affecting the cluster operation. The active gateway continues to handle the traffic while the standby gateway is upgraded, and then they switch roles.This way, there is no network downtime and no need to synchronize the cluster members before or after the upgrade1.However, some connections may be dropped during the switch-over, so it is recommended to use a connectivity upgrade or a zero downtime upgrade for mission-critical environments2.

Which two Cluster Solutions are available under R81.20?

A.
ClusterXL and NSRP
A.
ClusterXL and NSRP
Answers
B.
VRRPandHSRP
B.
VRRPandHSRP
Answers
C.
VRRP and IP Clustering
C.
VRRP and IP Clustering
Answers
D.
ClusterXL and VRitP
D.
ClusterXL and VRitP
Answers
Suggested answer: D

Explanation:

ClusterXL and VRRP are the two cluster solutions that are available under R81.20.According to the ClusterXL R81.20 Administration Guide1, ClusterXL is a Check Point software-based clustering solution that provides high availability and load sharing for Check Point Security Gateways and Cluster Members. ClusterXL supports two modes: High Availability and Load Sharing. In High Availability mode, all Cluster Members are connected to the same network segment and share a virtual IP address. One member is active and handles all traffic, while the others are in standby mode and ready to take over in case of a failure. In Load Sharing mode, all Cluster Members are active and share the traffic load according to a predefined algorithm.ClusterXL supports both unicast and multicast modes for Load Sharing1.

VRRP (Virtual Router Redundancy Protocol) is an industry standard protocol that provides high availability for routers or firewalls by creating a virtual router with a virtual IP address that is shared by a group of routers or firewalls. One router or firewall is elected as the master and handles all traffic directed to the virtual IP address, while the others are backups that monitor the master and take over if it fails.VRRP can be used with Check Point Security Gateways to provide redundancy and failover for external interfaces1.

NSRP (NetScreen Redundancy Protocol) is a proprietary protocol developed by Juniper Networks that provides high availability and load balancing for NetScreen firewalls.NSRP is not supported by Check Point products2.

HSRP (Hot Standby Router Protocol) is a Cisco proprietary protocol that provides high availability for routers by creating a virtual router with a virtual IP address that is shared by a group of routers. One router is elected as the active router and handles all traffic directed to the virtual IP address, while another router is elected as the standby router and monitors the active router and takes over if it fails. HSRP is not supported by Check Point products.

IP Clustering is a feature of Linux Virtual Server (LVS) that provides high availability and load balancing for IP-based services by creating a cluster of real servers that are accessed through a virtual IP address. The cluster is managed by a director that routes requests to the real servers according to a scheduling algorithm. IP Clustering is not supported by Check Point products.

Which is the command to identify the NIC driver before considering about the employment of the Multi-Queue feature?

A.
show interface eth0 mq
A.
show interface eth0 mq
Answers
B.
ethtool A eth0
B.
ethtool A eth0
Answers
C.
ifconfig -i eth0 verbose
C.
ifconfig -i eth0 verbose
Answers
D.
ip show Int eth0
D.
ip show Int eth0
Answers
Suggested answer: B

Explanation:

The command to identify the NIC driver before considering about the employment of the Multi-Queue feature isethtool -i eth0, whereeth0is the name of the network interface.This command displays the information about the driver and firmware version of the NIC, as well as other details such as bus-info and supported features1.The Multi-Queue feature requires a NIC driver that supports multiple transmit and receive queues2.

An established connection is going to www.google.com. The Application Control Blade Is inspecting the traffic. If SecureXL and CoreXL are both enabled, which path is handling the traffic?

A.
Slow Path
A.
Slow Path
Answers
B.
Fast Path
B.
Fast Path
Answers
C.
Medium Path
C.
Medium Path
Answers
D.
Accelerated Path
D.
Accelerated Path
Answers
Suggested answer: D

Explanation:

The traffic is handled by the Accelerated Path.According to the R81.x Security Gateway Architecture (Logical Packet Flow)1, the Accelerated Path is the fastest path for processing packets, as it bypasses most of the inspection and uses SecureXL to accelerate the traffic.The Accelerated Path is used for connections that are established, compliant with the security policy, and do not require any content inspection or NAT1.

The Application Control blade inspects the traffic based on the application identity, which is determined by the Application Control Software Blade in the Medium Path1.However, once the application identity is established, the connection can be offloaded to SecureXL and handled by the Accelerated Path2.This way, the Application Control blade can improve performance and reduce CPU consumption2.

The other paths are not used for this traffic because:

The Slow Path is used for packets that are not compliant with the security policy, require stateful inspection or NAT, or are not supported by SecureXL1.This path involves the most inspection and processing, and is therefore the slowest3.

The Fast Path is used for packets that are trusted and do not require any inspection or NAT.This path bypasses both SecureXL and the Firewall kernel, and uses a kernel module called simfast to forward the packets directly to the network interface driver4.This path is not enabled by default, and requires manual configuration of rules to define which traffic can use it4.

The Medium Path is used for packets that require content inspection, such as IPS, Anti-Virus, Anti-Bot, URL Filtering, or Application Control1.This path uses SecureXL to accelerate some parts of the inspection, but still involves some processing by the Firewall kernel3.This path is only used for the first few packets of a connection until the application identity is established, and then the connection can be offloaded to the Accelerated Path2.

SecureXL is able to accelerate the Connection Rate using templates. Which attributes are used in the template to identify the connection?

A.
Source address. Destination address. Source Port, Destination port
A.
Source address. Destination address. Source Port, Destination port
Answers
B.
Source address. Destination address. Destination port
B.
Source address. Destination address. Destination port
Answers
C.
Source address. Destination address. Destination port. Pro^col
C.
Source address. Destination address. Destination port. Pro^col
Answers
D.
Source address. Destination address. Source Port, Destination port. Protocol
D.
Source address. Destination address. Source Port, Destination port. Protocol
Answers
Suggested answer: D

Explanation:

SecureXL uses templates to accelerate the connection rate by creating a connection entry in the SecureXL Connections Table without notifying the Firewall kernel for a predefined period of time1.This reduces the load on the Firewall kernel and improves the performance of new connections1.SecureXL uses five attributes to identify a connection and create a template: source address, destination address, source port, destination port, and protocol2.These attributes form a unique 5-tuple that defines a connection2.

Total 626 questions
Go to page: of 63