ExamGecko
Home Home / Checkpoint / 156-315.81

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 58

Question list
Search
Search

What is NOT a Cluster Mode?

A.
Load Sharing Unicast
A.
Load Sharing Unicast
Answers
B.
Load Sharing Multicast
B.
Load Sharing Multicast
Answers
C.
Active-Active
C.
Active-Active
Answers
D.
High Availability Multicast
D.
High Availability Multicast
Answers
Suggested answer: C

Explanation:

Active-Active is not a cluster mode. Active-Active is a cluster configuration where both members are active and handle traffic simultaneously. However, this configuration is only supported for VSX clusters, not for regular clusters. The cluster modes for regular clusters are High Availability (HA), Load Sharing Unicast, and Load Sharing Multicast.

Reference: [Check Point Security Expert R81 ClusterXL Administration Guide], page 7.

Return oriented programming (ROP) exploits are detected by which security blade?

A.
Data Loss Prevention
A.
Data Loss Prevention
Answers
B.
Check Point Anti-Virus / Threat Emulation
B.
Check Point Anti-Virus / Threat Emulation
Answers
C.
Application control
C.
Application control
Answers
D.
Intrusion Prevention Software
D.
Intrusion Prevention Software
Answers
Suggested answer: B

Explanation:

Return-oriented programming (ROP) exploits are detected by Check Point Anti-Virus / Threat Emulation blade. ROP exploits are a type of code reuse attack that bypasses common exploit mitigation techniques such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR). Check Point Anti-Virus / Threat Emulation blade can detect and prevent ROP exploits using its behavioral analysis engine that monitors the execution flow of processes and identifies malicious patterns.

Reference: [Check Point Security Expert R81 Threat Prevention Administration Guide], page 17.

Alice wants to upgrade the current security management machine from R80.40 to R81.20 and she wants to check the Deployment Agent status over the GAIA CLISH. Which of the following GAIACLISH command is true?

A.
show agent status
A.
show agent status
Answers
B.
show uninstaller status
B.
show uninstaller status
Answers
C.
show installer packages
C.
show installer packages
Answers
D.
show installer status
D.
show installer status
Answers
Suggested answer: D

Explanation:

The correct command for checking the Deployment Agent status over the GAIA CLISH is ''show installer status''. This command displays information about the Deployment Agent such as its version, status, last update time, and last operation result. The other commands are either invalid or irrelevant for this purpose.

Reference: [Check Point Security Expert R81 Installation and Upgrade Guide], page 23.

Which statement is false in respect of the SmartConsole after upgrading the management server to R81.20?

A.
Yes. You can download the SmartConsole directly from the Download Center
A.
Yes. You can download the SmartConsole directly from the Download Center
Answers
B.
As far as you use version R80.40, no upgrade is needed due to compatibility mode
B.
As far as you use version R80.40, no upgrade is needed due to compatibility mode
Answers
C.
Yes, using CPUSE you can make the installer available in the Web Portal of the Management Server
C.
Yes, using CPUSE you can make the installer available in the Web Portal of the Management Server
Answers
D.
Yes, the SmartConsole Upgrade package can be installed using CPUSE
D.
Yes, the SmartConsole Upgrade package can be installed using CPUSE
Answers
Suggested answer: B

Explanation:

The statement that is false in respect of the SmartConsole after upgrading the management server to R81.20 is that as far as you use version R80.40, no upgrade is needed due to compatibility mode. This is false because SmartConsole R80.40 is not compatible with R81.20 management server and you need to upgrade your SmartConsole to R81.20 as well. The other statements are true and valid ways to obtain the SmartConsole upgrade package.

Reference: [Check Point Security Expert R81 Installation and Upgrade Guide], page 18.

Which statement is WRONG regarding the usage of the Central Deployment in SmartConsole?

A.
You can install Hotfixes with the Central Deployment in SmartConsole
A.
You can install Hotfixes with the Central Deployment in SmartConsole
Answers
B.
You can install Jumbo Hotfix accumulators with the Central Deployment in SmartConsole.
B.
You can install Jumbo Hotfix accumulators with the Central Deployment in SmartConsole.
Answers
C.
Only be installed Hotfixes can with the Central Deployment in SmartConsole
C.
Only be installed Hotfixes can with the Central Deployment in SmartConsole
Answers
D.
You can upgrade your cluster without user intervention with the Central Deployment in SmartConsole from R80.40 to R81.20.
D.
You can upgrade your cluster without user intervention with the Central Deployment in SmartConsole from R80.40 to R81.20.
Answers
Suggested answer: C

Explanation:

The statement that is wrong regarding the usage of the Central Deployment in SmartConsole is that only be installed Hotfixes can with the Central Deployment in SmartConsole. This is wrong because Central Deployment can also be used to install Jumbo Hotfix accumulators, upgrade clusters, and perform other operations on multiple gateways simultaneously. Central Deployment simplifies and automates the deployment process and reduces human errors and downtime.

Reference: [Check Point Security Expert R81 Administration Guide], page 23.

Native Applications require a thin client under which circumstances?

A.
If you want to use a legacy 32-Bit Windows OS
A.
If you want to use a legacy 32-Bit Windows OS
Answers
B.
If you want to use a VPN Client that is not officially supported by the underlying operating system
B.
If you want to use a VPN Client that is not officially supported by the underlying operating system
Answers
C.
If you want to have assigned a particular Office Mode IP address.
C.
If you want to have assigned a particular Office Mode IP address.
Answers
D.
If you are about to use a client (FTP. RDP, ...) that is installed on the endpoint.
D.
If you are about to use a client (FTP. RDP, ...) that is installed on the endpoint.
Answers
Suggested answer: D

Explanation:

Native Applications require a thin client under the circumstance that you are about to use a client (FTP, RDP, etc.) that is installed on the endpoint. A thin client is a lightweight software component that enables secure connectivity for native applications without requiring additional configuration or user intervention. A thin client is automatically downloaded and installed on the endpoint when a user initiates a native application session through Mobile Access Portal or SNX Portal.

Reference: [Check Point Security Expert R81 Mobile Access Administration Guide], page 16.

What are the two ClusterXL Deployment options?

A.
Distributed and Full High Availability
A.
Distributed and Full High Availability
Answers
B.
Broadcast and Multicast Mode
B.
Broadcast and Multicast Mode
Answers
C.
Distributed and Standalone
C.
Distributed and Standalone
Answers
D.
Unicast and Multicast Mode
D.
Unicast and Multicast Mode
Answers
Suggested answer: A

Explanation:

The two ClusterXL Deployment options are Distributed and Full High Availability. Distributed deployment means that each cluster member has its own Security Management Server and synchronizes with other members. Full High Availability deployment means that one cluster member is active and handles all traffic, while the other members are in standby mode and ready to take over in case of a failure. The other options are not valid ClusterXL Deployment options, but rather ClusterXL Modes or ClusterXL Load Sharing Methods.

Reference: [Check Point Security Expert R81 ClusterXL Administration Guide], page 6.

What could NOT be a reason for synchronization issues in a Management HA environment?

A.
Accidentally, you have configured unique IP addresses per Management Server which invalidates the CA Certificate
A.
Accidentally, you have configured unique IP addresses per Management Server which invalidates the CA Certificate
Answers
B.
There is a network connectivity failure between the servers
B.
There is a network connectivity failure between the servers
Answers
C.
Servers are in Collision Mode. Two servers, both in active state cannot be synchronized either automatically or manually.
C.
Servers are in Collision Mode. Two servers, both in active state cannot be synchronized either automatically or manually.
Answers
D.
The products installed on the servers do not match: one device is a Standalone Server while the other is only a Security Management server
D.
The products installed on the servers do not match: one device is a Standalone Server while the other is only a Security Management server
Answers
Suggested answer: D

Explanation:

The statement that could not be a reason for synchronization issues in a Management HA environment is that the products installed on the servers do not match: one device is a Standalone Server while the other is only a Security Management server. This is not a valid reason because Management HA requires that both servers have the same products installed, either both as Standalone Servers or both as Security Management servers. The other statements are possible reasons for synchronization issues in a Management HA environment.

Reference: [Check Point Security Expert R81 High Availability Administration Guide], page 11.

After replacing a faulty Gateway the admin installed the new Hardware and want to push the policy. Installing the policy using the SmartConsole he got an Error for the Threat Prevention Policy. There is no error for the Access Control Policy. What will be the most common cause for the issue?

A.
The admin forgot to reestablish the SIC for the new hardware. That is typically the case when configure only the interfaces of the replacement hardware instead restoring a backup.
A.
The admin forgot to reestablish the SIC for the new hardware. That is typically the case when configure only the interfaces of the replacement hardware instead restoring a backup.
Answers
B.
The IPS Protection engine on the replacement hardware is too old. Before pushing the Threat Prevention Policy use SmartConsole -> Security Policies -> Updates -> IPS 'Update Now' to update the engine.
B.
The IPS Protection engine on the replacement hardware is too old. Before pushing the Threat Prevention Policy use SmartConsole -> Security Policies -> Updates -> IPS 'Update Now' to update the engine.
Answers
C.
The admin forgot to apply the new license. The Access Control license is included by default but the service subscriptions for the Threat Prevention Blades are missing.
C.
The admin forgot to apply the new license. The Access Control license is included by default but the service subscriptions for the Threat Prevention Blades are missing.
Answers
D.
The Threat Prevention Policy can't be installed on a Gateway without an already installed Access Control Policy. First install only the Access Control Policy.
D.
The Threat Prevention Policy can't be installed on a Gateway without an already installed Access Control Policy. First install only the Access Control Policy.
Answers
Suggested answer: C

Explanation:

The most common cause for the issue is that the admin forgot to apply the new license. The Access Control license is included by default but the service subscriptions for the Threat Prevention Blades are missing. Without a valid license, the Threat Prevention Policy cannot be installed on the new hardware. The admin should check the license status on the SmartConsole -> Gateways & Servers -> Licenses & Contracts and apply the appropriate license for the replacement hardware.Reference:Check Point Certified Security Expert R81.20 Course Overview,sk171213: Threat Prevention policy installation reports failure in SmartConsole with this error: ''Policy installation had failed due to an internal error.''

The fwd process on the Security Gateway sends logs to the fwd process on the Management Server, where it is forwarded to___________via____________

A.
cpd, fwm
A.
cpd, fwm
Answers
B.
cpm, cpd
B.
cpm, cpd
Answers
C.
fwm, cpd
C.
fwm, cpd
Answers
D.
cpwd, fwssd
D.
cpwd, fwssd
Answers
Suggested answer: C

Explanation:

The fwd process on the Security Gateway sends logs to the fwd process on the Management Server, where it is forwarded tofwmviacpd. The fwm process is responsible for managing the log files and the cpd process is responsible for communication between processes. The other options are incorrect because they involve processes that are not related to logging or communication.Reference:Check Point Certified Security Expert R81.20 Course Overview,sk163413: Support, Support Requests, Training ... - Check Point Software,Check Point Certified Security Expert R81.20

Total 626 questions
Go to page: of 63