ExamGecko
Home Home / Checkpoint / 156-315.81

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 54

Question list
Search
Search

Which Correction mechanisms are available with ClusterXL under R81.20?

A.
Correction Mechanisms are only available of Maestro Hyperscale Orchestrators
A.
Correction Mechanisms are only available of Maestro Hyperscale Orchestrators
Answers
B.
Pre-Correction and SDF (Sticky Decision Function)
B.
Pre-Correction and SDF (Sticky Decision Function)
Answers
C.
SDF (Sticky Decision Function) and Flush and ACK
C.
SDF (Sticky Decision Function) and Flush and ACK
Answers
D.
Dispatcher (Early Correction) and Firewall (Late Correction)
D.
Dispatcher (Early Correction) and Firewall (Late Correction)
Answers
Suggested answer: C

Explanation:

SDF (Sticky Decision Function) and Flush and ACK are the two correction mechanisms that are available with ClusterXL under R81.20.According to the ClusterXL R81.20 Administration Guide1, correction mechanisms are methods that ClusterXL uses to prevent or recover from out-of-state situations, which occur when different Cluster Members have different information about the connections that they handle1.ClusterXL supports two types of correction mechanisms: SDF and Flush and ACK1.

SDF (Sticky Decision Function) is a mechanism that ensures that packets of the same connection are always handled by the same Cluster Member, regardless of the load balancing algorithm. SDF uses a hash table that maps each connection to a specific Cluster Member, based on the 5-tuple of source IP, destination IP, source port, destination port, and protocol.SDF prevents out-of-state situations by avoiding the switch of Cluster Members for existing connections1.

Flush and ACK is a mechanism that synchronizes the connection tables of different Cluster Members when an out-of-state situation is detected. Flush and ACK works as follows:

When a Cluster Member receives a packet that belongs to an unknown connection, it sends a Flush message to all other Cluster Members, asking them to delete the connection from their tables.

When a Cluster Member receives a Flush message, it checks if it has the connection in its table. If it does, it deletes the connection and sends an ACK message to the sender of the Flush message, indicating that it has performed the deletion.

When a Cluster Member receives an ACK message, it creates a new connection entry in its table for the packet that triggered the Flush message, and processes the packet normally.

If a Cluster Member does not receive any ACK message within a timeout period, it assumes that no other Cluster Member has the connection, and creates a new connection entry in its table for the packet that triggered the Flush message1.

Which upgrade method you should use upgrading from R80.40 to R81.20 to avoid any downtime?

A.
Zero Downtime Upgrade (ZDU)
A.
Zero Downtime Upgrade (ZDU)
Answers
B.
Connectivity Upgrade (CU)
B.
Connectivity Upgrade (CU)
Answers
C.
Minimal Effort Upgrade (ME)
C.
Minimal Effort Upgrade (ME)
Answers
D.
Multi-Version Cluster Upgrade (MVC)
D.
Multi-Version Cluster Upgrade (MVC)
Answers
Suggested answer: D

Explanation:

The correct upgrade method for upgrading from R80.40 to R81.20 without any downtime is the Multi-Version Cluster Upgrade (MVC). MVC is a new feature in R80.40 that replaces the deprecated Connectivity Upgrade (CU). MVC allows you to upgrade cluster members to a newer version without losing connectivity and test the new version on some of the cluster members before you decide to upgrade the rest of the cluster members. MVC synchronizes connections between cluster members that run different versions and ensures that the cluster remains operational during the upgrade process. MVC is intended only to test the current configuration in the newer version and not to change the security policy and install it on cluster members with different software versions. MVC is disabled by default and can be enabled on each cluster member individually. MVC has some limitations, such as not supporting VSX clusters, IPS blade, or SecureXL acceleration.

Multi-Version Cluster (MVC) replaces Connectivity Upgrade (CU) in R80.40

Multi-Version Cluster (MVC) Upgrade

Configuring the Multi-Version Cluster Mechanism

How can you see historical data with cpview?

A.
cpview -f <timestamp>
A.
cpview -f <timestamp>
Answers
B.
cpview -e <timestamp>
B.
cpview -e <timestamp>
Answers
C.
cpview -t <timestamp>
C.
cpview -t <timestamp>
Answers
D.
cpview -d <timestamp>
D.
cpview -d <timestamp>
Answers
Suggested answer: C

Explanation:

To see historical data with cpview, you can use the cpview -t <timestamp> command, where <timestamp> is the date and time you want to view. For example, cpview -t Jan 01 2023 12:00:00 will show you the cpview data for January 1st, 2023 at noon. You can also enter a partial date, such as Jan 02, to see the data for the whole day.This feature is available in R77.10 and higher versions of Check Point software1.You can also access the historical data by pressing the ''t'' key while running cpview in live mode and entering the desired date and time1.The historical data is stored in the CPViewDB.dat file in the /var/log/CPView_history directory on your gateway2.You can export this file and import it into other tools for visualization, such as Grafana3.

Alice & Bob are concurrently logged In via SSH on the same Check Point Security Gateway as user 'admin* however Bob was first logged in and acquired the lock Alice Is not aware that Bob is also togged in to the same Security Management Server as she is but she needs to perform very urgent configuration changes - which of the following GAlAclish command is true for overriding Bobs configuration database lock:

A.
lock database override
A.
lock database override
Answers
B.
unlock override database
B.
unlock override database
Answers
C.
unlock database override
C.
unlock database override
Answers
D.
database unlock override
D.
database unlock override
Answers
Suggested answer: A

Explanation:

To override Bob's configuration database lock, Alice can use the commandlock database overridein the clish shell. This command will transfer the lock from Bob to Alice and allow her to make the urgent configuration changes. However, this command should be used with caution, as it may cause conflicts or inconsistencies if Bob and Alice are working on the same objects or policies.It is recommended to communicate with other administrators before using this command and to release the lock as soon as possible after finishing the changes1. The other commands are not valid in clish and will result in an error message.

What command is used to manually failover a cluster during a zero-downtime upgrade?

A.
set cluster member down
A.
set cluster member down
Answers
B.
cpstop
B.
cpstop
Answers
C.
clusterXL_admin down
C.
clusterXL_admin down
Answers
D.
set clusterXL down
D.
set clusterXL down
Answers
Suggested answer: C

Explanation:

To manually failover a cluster during a zero-downtime upgrade, you can use the commandclusterXL_admin downon the active cluster member. This command will gracefully change the state of the cluster member to down and trigger a failover to the standby cluster member. This way, you can upgrade the cluster member that is now down without affecting the traffic processed by the other cluster member. You can then use the commandclusterXL_admin upto bring the upgraded cluster member back online and repeat the process for the other cluster member.This command is useful for testing and debugging purposes and does not survive reboot unless you add the-poption or use theset cluster member admin down/up permanentcommand in clish1. The other commands are not valid for initiating a manual failover. Theset cluster member downcommand is used to remove a cluster member from a cluster. Thecpstopcommand is used to stop all Check Point services on a gateway. Theset clusterXL downcommand does not exist.

Packet acceleration (SecureXL) identities connections by several attributes. Which of the attributes is NOT used for identifying connection?

A.
Source Port
A.
Source Port
Answers
B.
TCP Acknowledgment Number
B.
TCP Acknowledgment Number
Answers
C.
Source Address
C.
Source Address
Answers
D.
Destination Address
D.
Destination Address
Answers
Suggested answer: B

Explanation:

SecureXL does not use the TCP acknowledgment number as an attribute for identifying connections. SecureXL is a technology that accelerates the performance of the firewall by offloading some of the traffic processing from the firewall kernel to a more efficient path.SecureXL identifies connections by five attributes: source address, destination address, source port, destination port, and protocol1. These attributes are also known as the 5-tuple or the connection key. SecureXL uses these attributes to match packets to existing connections and apply the appropriate security policy and actions.SecureXL does not need to inspect the TCP sequence or acknowledgment numbers, as they are irrelevant for the connection identification and security enforcement2.The TCP sequence and acknowledgment numbers are used by the TCP protocol to ensure reliable and ordered delivery of data between endpoints

What is required for a site-to-site VPN tunnel that does not use certificates?

A.
Pre-Shared Secret
A.
Pre-Shared Secret
Answers
B.
RSA Token
B.
RSA Token
Answers
C.
Unique Passwords
C.
Unique Passwords
Answers
D.
SecurelD
D.
SecurelD
Answers
Suggested answer: A

Explanation:

A pre-shared secret is a secret key that is shared between the two VPN peers before establishing a secure connection. It is used to authenticate the VPN peers and encrypt the VPN traffic. A pre-shared secret is required for a site-to-site VPN tunnel that does not use certificates, because certificates are another way of authenticating the VPN peers using public key cryptography. Without certificates, the VPN peers need to have a common secret key that only they know.

Reference:Check Point R81 VPN Administration Guide, page 13

Using AD Query, the security gateway connections to the Active Directory Domain Controllers using what protocol?

A.
Windows Management Instrumentation (WMI)
A.
Windows Management Instrumentation (WMI)
Answers
B.
Hypertext Transfer Protocol Secure (HTTPS)
B.
Hypertext Transfer Protocol Secure (HTTPS)
Answers
C.
Lightweight Directory Access Protocol (LDAP)
C.
Lightweight Directory Access Protocol (LDAP)
Answers
D.
Remote Desktop Protocol (RDP)
D.
Remote Desktop Protocol (RDP)
Answers
Suggested answer: A

Explanation:

Windows Management Instrumentation (WMI) is a protocol that allows remote management and monitoring of Windows systems. It is used by AD Query to connect to the Active Directory Domain Controllers and query them for user and computer information. AD Query uses WMI to get real-time updates on user logon events, group membership changes, and computer status changes. WMI is not the same as LDAP, which is a protocol for accessing and modifying directory services. HTTPS and RDP are also different protocols that are not used by AD Query.

Reference:Check Point R81 Identity Awareness Administration Guide, page 17

Name the file that is an electronically signed file used by Check Point to translate the features in the license into a code?

A.
Both License (.lic) and Contract (.xml) files
A.
Both License (.lic) and Contract (.xml) files
Answers
B.
cp.macro
B.
cp.macro
Answers
C.
Contract file (.xml)
C.
Contract file (.xml)
Answers
D.
license File (.lic)
D.
license File (.lic)
Answers
Suggested answer: B

Explanation:

cp.macro is an electronically signed file used by Check Point to translate the features in the license into a code. It is located in the $FWDIR/conf directory on the Security Management Server. The cp.macro file contains a list of features and their corresponding codes, which are used to generate the license file (.lic) based on the contract file (.xml). The license file (.lic) is then installed on the Security Gateway or Security Management Server to activate the licensed features.

Reference:Check Point R81 Licensing and Contract Administration Guide, page 10

What technologies are used to deny or permit network traffic?

A.
Stateful Inspection, Firewall Blade, and URL/Application Blade
A.
Stateful Inspection, Firewall Blade, and URL/Application Blade
Answers
B.
Packet Filtering, Stateful Inspection, and Application Layer Firewall
B.
Packet Filtering, Stateful Inspection, and Application Layer Firewall
Answers
C.
Firewall Blade, URL/Application Blade, and IPS
C.
Firewall Blade, URL/Application Blade, and IPS
Answers
D.
Stateful Inspection, URL/Application Blade, and Threat Prevention
D.
Stateful Inspection, URL/Application Blade, and Threat Prevention
Answers
Suggested answer: B

Explanation:

Packet filtering, stateful inspection, and application layer firewall are technologies used to deny or permit network traffic based on different criteria. Packet filtering is a basic firewall technology that examines the header of each packet and compares it to a set of rules to decide whether to allow or drop it. Stateful inspection is an advanced firewall technology that tracks the state and context of each connection and applies security rules based on the connection information. Application layer firewall is a firewall technology that inspects the content and behavior of applications and protocols at the application layer of the OSI model and enforces granular policies based on the application identity, user identity, and content type.

Reference:Check Point R81 Firewall Administration Guide, page 9-10

Total 626 questions
Go to page: of 63