Checkpoint 156-315.81 Practice Test - Questions Answers, Page 6

List of questions
Question 51

Which command lists all tables in Gaia?
The fw tab -s command lists all tables in Gaia. The fw tab command displays information about the firewall tables, such as connections, NAT translations, SAM rules, etc. The -s option shows a summary of all tables.Reference:fw tab - Check Point Support Center
Question 52

What is true about the IPS-Blade?
In R81, IPS is managed by the Threat Prevention Policy. The Threat Prevention Policy is a unified policy that allows you to configure and enforce IPS, Anti-Bot, Anti-Virus, Threat Emulation, and Threat Extraction settings in one place.Reference:Threat Prevention Administration Guide
Question 53

Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?
Detecting and blocking malware by correlating multiple detection engines before users are affected is not a feature associated with the Check Point URL Filtering and Application Control Blade. This feature is part of the Check Point SandBlast Network solution, which uses Threat Emulation and Threat Extraction technologies to prevent zero-day attacks. The other features are part of the URL Filtering and Application Control Blade, which allows you to control access to web applications and sites based on various criteria.Reference:URL Filtering and Application Control Administration Guide
Question 54

What is a feature that enables VPN connections to successfully maintain a private and secure VPN session without employing Stateful Inspection?
Wire Mode is a VPN-1 NGX feature that enables VPN connections to successfully fail over, bypassing Security Gateway enforcement. This improves performance and reduces downtime. Based on a trusted source and destination, Wire Mode uses internal interfaces and VPN Communities to maintain a private and secure VPN session, without employing Stateful Inspection. Since Stateful Inspection no longer takes place, dynamic-routing protocols that do not survive state verification in non-Wire Mode configurations can now be deployed. The VPN connection is no different from any other connections along a dedicated wire, thus the meaning of 'Wire Mode'.
Question 55

What Factor preclude Secure XL Templating?
SecureXL Templating is a feature that accelerates the processing of packets that belong to the same connection or session by creating a template for the first packet and applying it to the subsequent packets. SecureXL Templating is precluded by factors that prevent the creation of a template, such as source port ranges, encrypted connections, NAT, QoS, etc.Reference:SecureXL Mechanism
Question 56

In order to get info about assignment (FW, SND) of all CPUs in your SGW, what is the most accurate CLI command?
The fw ctl affinity -l -a -r -v command is the most accurate CLI command to get info about assignment (FW, SND) of all CPUs in your SGW. This command displays the affinity settings of all interfaces and processes in a verbose mode, including the Firewall (FW) and Secure Network Distributor (SND) instances.Reference:CoreXL Administration Guide
Question 57

Check Pont Central Deployment Tool (CDT) communicates with the Security Gateway / Cluster Members over Check Point SIC _______ .
Check Point Central Deployment Tool (CDT) communicates with the Security Gateway / Cluster Members over Check Point SIC using TCP port 18191 by default. CDT is a tool that allows you to perform simultaneous configuration changes on multiple gateways or clusters using predefined commands or scripts.Reference:Check Point Central Deployment Tool (CDT)
Question 58

The CPD daemon is a Firewall Kernel Process that does NOT do which of the following?
The CPD daemon is a Firewall Kernel Process that does not pull application monitoring status. The CPD daemon is responsible for Secure Internal Communication (SIC), restarting daemons if they fail, transferring messages between Firewall processes, and managing policy installation.Reference:CPD process
Question 59

What is not a component of Check Point SandBlast?
Threat Simulator is not a component of Check Point SandBlast. Check Point SandBlast is a solution that provides advanced protection against zero-day threats using four components: Threat Emulation, Threat Extraction, Threat Cloud, and Threat Prevention.Reference:Check Point SandBlast Network
Question 60

Full synchronization between cluster members is handled by Firewall Kernel. Which port is used for this?
Full synchronization between cluster members is handled by Firewall Kernel using TCP port 256 by default. Full synchronization occurs when a cluster member joins or rejoins the cluster and needs to receive the entire state table from another member.Reference: [ClusterXL Administration Guide]
Question