ExamGecko
Home Home / Checkpoint / 156-315.81

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 59

Question list
Search
Search

By default, how often does Threat Emulation update the engine on the Security Gateway?

A.
Once per day
A.
Once per day
Answers
B.
Once an hour
B.
Once an hour
Answers
C.
Once a week
C.
Once a week
Answers
D.
Twice per day
D.
Twice per day
Answers
Suggested answer: A

Explanation:

By default, Threat Emulation updates the engine on the Security Gatewayonce per day. This is the recommended frequency for optimal performance and security. However, the admin can change the update frequency to a different value, such as once an hour, once a week, or twice per day, depending on the network needs and resources. The admin can also manually update the engine at any time using the SmartConsole or the command line interface.Reference:Threat Emulation Engine Release Updates - Check Point Software,Check Point R81.20 Gaia Fresh Install and upgrade

In R81.20 a new feature dynamic log distribution was added. What is this for?

A.
Configure the Security Gateway to distribute logs between multiple active Log Servers to support a better rate of Logs and Log Servers redundancy
A.
Configure the Security Gateway to distribute logs between multiple active Log Servers to support a better rate of Logs and Log Servers redundancy
Answers
B.
In case of a Management High Availability the management server stores the logs dynamically on the member with the most available disk space in /var/log
B.
In case of a Management High Availability the management server stores the logs dynamically on the member with the most available disk space in /var/log
Answers
C.
Synchronize the log between the primary and secondary management server in case of a Management High Availability
C.
Synchronize the log between the primary and secondary management server in case of a Management High Availability
Answers
D.
To save disk space in case of a firewall cluster local logs are distributed between the cluster members.
D.
To save disk space in case of a firewall cluster local logs are distributed between the cluster members.
Answers
Suggested answer: A

Explanation:

https://resources.checkpoint.com/datasheet/certified-security-expert-ccse-r8120-course-overview

Dynamic log distribution is a feature that allows you to configure the Security Gateway to distribute logs between multiple active Log Servers to support a better rate of Logs and Log Servers redundancy. This means that each log is sent to only one Log Server and the load is balanced between the primary Log Servers. If all the primary Log Servers are disconnected, the logs are distributed between the backup Log Servers. If no Log Servers are connected, the gateway writes the logs locally. This feature improves the performance and reliability of logging and reduces the network traffic and disk space consumption.You can enable this feature on the SmartConsole -> Gateways & Servers -> Logs -> Dynamic Log Distribution1.

The other options are incorrect because they do not describe the dynamic log distribution feature.Option B is wrong because the Management High Availability does not store the logs dynamically on the member with the most available disk space, but rather synchronizes the logs between the members using the cpd process2. Option C is wrong because the dynamic log distribution feature does not synchronize the logs between the primary and secondary management server, but rather distributes the logs between the Log Servers. Option D is wrong because the dynamic log distribution feature does not save disk space in case of a firewall cluster, but rather distributes the logs between the Log Servers.The firewall cluster members do not store local logs, but rather send them to the Log Servers3.

What order should be used when upgrading a Management High Availability Cluster?

A.
Secondary Management, then Primary Management
A.
Secondary Management, then Primary Management
Answers
B.
Active Management, then Standby Management
B.
Active Management, then Standby Management
Answers
C.
Standby Management, then Active Management
C.
Standby Management, then Active Management
Answers
D.
Primary Management, then Secondary Management
D.
Primary Management, then Secondary Management
Answers
Suggested answer: C

Explanation:

The upgrade process for a Management High Availability Cluster is to first upgrade the Standby Management Server, then perform a failover and upgrade the Active Management Server. This way, the cluster can maintain its functionality and synchronization during the upgrade.

The references are:

Check Point R81 Upgrade Guide, page 17

Check Point Certified Security Expert R81.20 (CCSE) Core Training, slide 10

What are valid Policy Types in R81.X?

A.
Access Control, Threat Prevention, QoS, Desktop Security
A.
Access Control, Threat Prevention, QoS, Desktop Security
Answers
B.
Access Control, IPS, Threat Emulation, NAT
B.
Access Control, IPS, Threat Emulation, NAT
Answers
C.
Access Control, IPS, QoS, DLP
C.
Access Control, IPS, QoS, DLP
Answers
D.
Access Control, RemoteAccess VPN, NAT, IPS
D.
Access Control, RemoteAccess VPN, NAT, IPS
Answers
Suggested answer: C

Explanation:

Policy Types are the different types of security policies that can be configured and enforced on a Check Point gateway. The valid Policy Types in R81.X are:

Access Control: Defines the rules for allowing or blocking traffic based on source, destination, service, user, and other criteria.

IPS: Protects the network from known and unknown attacks by inspecting the traffic and applying signatures, protections, and actions.

QoS: Controls the bandwidth allocation and prioritization for different types of traffic and applications.

DLP: Prevents the leakage of sensitive data from the network by detecting and blocking data transfers that violate predefined rules.

The references are:

Check Point Certified Security Expert R81.20 (CCSE) Core Training, slide 11

Check Point Certified Security Administrator R81 - ExperTeach, page 5

Check Point Cybersecurity BootCamp R81.20 -- CCSA & CCSE Training, page 2

Fill in the blank: With the User Directory Software Blade, you can create user definitions on a(n)_____________ Server.

A.
SecurID
A.
SecurID
Answers
B.
NT domain
B.
NT domain
Answers
C.
LDAP
C.
LDAP
Answers
D.
SMTP
D.
SMTP
Answers
Suggested answer: C

Explanation:

The User Directory Software Blade allows you to create user definitions on an LDAP server, such as Active Directory, and use them in your security policy. You can also integrate with other user authentication methods, such as SecurID, RADIUS, or TACACS+, but you cannot create user definitions on those servers.

The references are:

Check Point Certified Security Expert R81.20 (CCSE) Core Training, slide 13

Check Point R81 Quantum Security Gateway Guide, page 139

Check Point R81 Identity Awareness Administration Guide, page 9

What is the purpose of Captive Portal?

A.
It authenticates users, allowing them access to the Gaia OS
A.
It authenticates users, allowing them access to the Gaia OS
Answers
B.
It authenticates users, allowing them access to the Internet and corporate resources
B.
It authenticates users, allowing them access to the Internet and corporate resources
Answers
C.
It provides remote access to SmartConsole
C.
It provides remote access to SmartConsole
Answers
D.
It manages user permission in SmartConsole
D.
It manages user permission in SmartConsole
Answers
Suggested answer: B

Explanation:

Captive Portal is a feature of Identity Awareness Software Blade that enables you to identify users who are not authenticated by other methods, such as Active Directory or VPN. Captive Portal redirects users to a web page where they can enter their credentials and be authenticated by an external server, such as LDAP or RADIUS. After authentication, users can access the Internet and corporate resources according to the security policy rules that apply to their identity.

The references are:

Check Point R81 Identity Awareness Administration Guide, page 9

Configuring Browser-Based Authentication in SmartConsole

Which of the following is an authentication method used for Identity Awareness?

A.
RSA
A.
RSA
Answers
B.
SSL
B.
SSL
Answers
C.
Captive Portal
C.
Captive Portal
Answers
D.
PKI
D.
PKI
Answers
Suggested answer: C

Explanation:

Captive Portal is one of the authentication methods used for Identity Awareness, which is a feature of Check Point that enables you to identify users and apply security policy rules based on their identity. Captive Portal redirects users to a web page where they can enter their credentials and be authenticated by an external server, such as LDAP or RADIUS. After authentication, users can access the Internet and corporate resources according to the security policy rules that apply to their identity.

The references are:

Machine Authentication & Identity Awareness - Check Point CheckMates

Check Point Certified Security Expert R81.20, slide 13

Check Point R81 Identity Awareness Administration Guide, page 9

What object type would you use to grant network access to an LDAP user group?

A.
Access Role
A.
Access Role
Answers
B.
Group Template
B.
Group Template
Answers
C.
SmartDirectory Group
C.
SmartDirectory Group
Answers
D.
User Group
D.
User Group
Answers
Suggested answer: A

Which of the following is NOT a component of a Distinguished Name?

A.
Common Name
A.
Common Name
Answers
B.
Country
B.
Country
Answers
C.
User container
C.
User container
Answers
D.
Organizational Unit
D.
Organizational Unit
Answers
Suggested answer: D

Explanation:

A Distinguished Name (DN) is a unique identifier for an object in an LDAP directory, such as a user, a group, or an organization. A DN consists of a sequence of relative distinguished names (RDNs), which are attributes that describe the object. The most common RDNs are:

Common Name (CN): The name of the object, such as a user's full name or a group's name

Country : The two-letter ISO code of the country where the object is located, such as US or PK

User container (UC): The name of the container that holds the user objects, such as Users or People

Domain Component (DC): The name of the domain that the object belongs to, such as checkpoint.com or example.org

An Organizational Unit (OU) is not a component of a DN, but a type of object that can be used to organize other objects in a hierarchical structure. An OU can have its own DN, which includes the OU attribute as an RDN, such as OU=Sales,DC=checkpoint,DC=com.

The references are:

Check Point R81 Identity Awareness Administration Guide, page 14

LDAP Distinguished Names

What is a Distinguished Name?

An administrator wishes to enable Identity Awareness on the Check Point firewalls. However, they allow users to use company issued or personal laptops. Since the administrator cannot manage the personal laptops, which of the following methods would BEST suit this company?

A.
AD Query
A.
AD Query
Answers
B.
Terminal Servers Agent
B.
Terminal Servers Agent
Answers
C.
Identity Agents
C.
Identity Agents
Answers
D.
Browser-Based Authentication
D.
Browser-Based Authentication
Answers
Suggested answer: D

Explanation:

Browser-Based Authentication is an identity awareness method that enables you to identify users who are not authenticated by other methods, such as Active Directory or VPN. Browser-Based Authentication redirects users to a web page where they can enter their credentials and be authenticated by an external server, such as LDAP or RADIUS. After authentication, users can access the Internet and corporate resources according to the security policy rules that apply to their identity.

Browser-Based Authentication is suitable for scenarios where users can use company issued or personal laptops, since it does not require any installation or configuration on the user's device. It also supports various operating systems and browsers, and can be customized to match the company's branding.

The references are:

Check Point R81 Identity Awareness Administration Guide, page 9

Configuring Browser-Based Authentication in SmartConsole

Check Point Certified Security Expert R81.20 (CCSE) Core Training, slide 13

Total 626 questions
Go to page: of 63