ExamGecko
Home Home / Checkpoint / 156-315.81

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 6

Question list
Search
Search

Which command lists all tables in Gaia?

A.
fw tab --t
A.
fw tab --t
Answers
B.
fw tab --list
B.
fw tab --list
Answers
C.
fw-tab --s
C.
fw-tab --s
Answers
D.
fw tab -1
D.
fw tab -1
Answers
Suggested answer: C

Explanation:

The fw tab -s command lists all tables in Gaia. The fw tab command displays information about the firewall tables, such as connections, NAT translations, SAM rules, etc. The -s option shows a summary of all tables.Reference:fw tab - Check Point Support Center

What is true about the IPS-Blade?

A.
In R81, IPS is managed by the Threat Prevention Policy
A.
In R81, IPS is managed by the Threat Prevention Policy
Answers
B.
In R81, in the IPS Layer, the only three possible actions are Basic, Optimized and Strict
B.
In R81, in the IPS Layer, the only three possible actions are Basic, Optimized and Strict
Answers
C.
In R81, IPS Exceptions cannot be attached to ''all rules''
C.
In R81, IPS Exceptions cannot be attached to ''all rules''
Answers
D.
In R81, the GeoPolicy Exceptions and the Threat Prevention Exceptions are the same
D.
In R81, the GeoPolicy Exceptions and the Threat Prevention Exceptions are the same
Answers
Suggested answer: A

Explanation:

In R81, IPS is managed by the Threat Prevention Policy. The Threat Prevention Policy is a unified policy that allows you to configure and enforce IPS, Anti-Bot, Anti-Virus, Threat Emulation, and Threat Extraction settings in one place.Reference:Threat Prevention Administration Guide

Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?

A.
Detects and blocks malware by correlating multiple detection engines before users are affected.
A.
Detects and blocks malware by correlating multiple detection engines before users are affected.
Answers
B.
Configure rules to limit the available network bandwidth for specified users or groups.
B.
Configure rules to limit the available network bandwidth for specified users or groups.
Answers
C.
Use UserCheck to help users understand that certain websites are against the company's security policy.
C.
Use UserCheck to help users understand that certain websites are against the company's security policy.
Answers
D.
Make rules to allow or block applications and Internet sites for individual applications, categories, and risk levels.
D.
Make rules to allow or block applications and Internet sites for individual applications, categories, and risk levels.
Answers
Suggested answer: A

Explanation:

Detecting and blocking malware by correlating multiple detection engines before users are affected is not a feature associated with the Check Point URL Filtering and Application Control Blade. This feature is part of the Check Point SandBlast Network solution, which uses Threat Emulation and Threat Extraction technologies to prevent zero-day attacks. The other features are part of the URL Filtering and Application Control Blade, which allows you to control access to web applications and sites based on various criteria.Reference:URL Filtering and Application Control Administration Guide

What is a feature that enables VPN connections to successfully maintain a private and secure VPN session without employing Stateful Inspection?

A.
Stateful Mode
A.
Stateful Mode
Answers
B.
VPN Routing Mode
B.
VPN Routing Mode
Answers
C.
Wire Mode
C.
Wire Mode
Answers
D.
Stateless Mode
D.
Stateless Mode
Answers
Suggested answer: C

Explanation:

Wire Mode is a VPN-1 NGX feature that enables VPN connections to successfully fail over, bypassing Security Gateway enforcement. This improves performance and reduces downtime. Based on a trusted source and destination, Wire Mode uses internal interfaces and VPN Communities to maintain a private and secure VPN session, without employing Stateful Inspection. Since Stateful Inspection no longer takes place, dynamic-routing protocols that do not survive state verification in non-Wire Mode configurations can now be deployed. The VPN connection is no different from any other connections along a dedicated wire, thus the meaning of 'Wire Mode'.

What Factor preclude Secure XL Templating?

A.
Source Port Ranges/Encrypted Connections
A.
Source Port Ranges/Encrypted Connections
Answers
B.
IPS
B.
IPS
Answers
C.
ClusterXL in load sharing Mode
C.
ClusterXL in load sharing Mode
Answers
D.
CoreXL
D.
CoreXL
Answers
Suggested answer: A

Explanation:

SecureXL Templating is a feature that accelerates the processing of packets that belong to the same connection or session by creating a template for the first packet and applying it to the subsequent packets. SecureXL Templating is precluded by factors that prevent the creation of a template, such as source port ranges, encrypted connections, NAT, QoS, etc.Reference:SecureXL Mechanism

In order to get info about assignment (FW, SND) of all CPUs in your SGW, what is the most accurate CLI command?

A.
fw ctl sdstat
A.
fw ctl sdstat
Answers
B.
fw ctl affinity --l --a --r --v
B.
fw ctl affinity --l --a --r --v
Answers
C.
fw ctl multik stat
C.
fw ctl multik stat
Answers
D.
cpinfo
D.
cpinfo
Answers
Suggested answer: B

Explanation:

The fw ctl affinity -l -a -r -v command is the most accurate CLI command to get info about assignment (FW, SND) of all CPUs in your SGW. This command displays the affinity settings of all interfaces and processes in a verbose mode, including the Firewall (FW) and Secure Network Distributor (SND) instances.Reference:CoreXL Administration Guide

Check Pont Central Deployment Tool (CDT) communicates with the Security Gateway / Cluster Members over Check Point SIC _______ .

A.
TCP Port 18190
A.
TCP Port 18190
Answers
B.
TCP Port 18209
B.
TCP Port 18209
Answers
C.
TCP Port 19009
C.
TCP Port 19009
Answers
D.
TCP Port 18191
D.
TCP Port 18191
Answers
Suggested answer: D

Explanation:

Check Point Central Deployment Tool (CDT) communicates with the Security Gateway / Cluster Members over Check Point SIC using TCP port 18191 by default. CDT is a tool that allows you to perform simultaneous configuration changes on multiple gateways or clusters using predefined commands or scripts.Reference:Check Point Central Deployment Tool (CDT)

The CPD daemon is a Firewall Kernel Process that does NOT do which of the following?

A.
Secure Internal Communication (SIC)
A.
Secure Internal Communication (SIC)
Answers
B.
Restart Daemons if they fail
B.
Restart Daemons if they fail
Answers
C.
Transfers messages between Firewall processes
C.
Transfers messages between Firewall processes
Answers
D.
Pulls application monitoring status
D.
Pulls application monitoring status
Answers
Suggested answer: D

Explanation:

The CPD daemon is a Firewall Kernel Process that does not pull application monitoring status. The CPD daemon is responsible for Secure Internal Communication (SIC), restarting daemons if they fail, transferring messages between Firewall processes, and managing policy installation.Reference:CPD process

What is not a component of Check Point SandBlast?

A.
Threat Emulation
A.
Threat Emulation
Answers
B.
Threat Simulator
B.
Threat Simulator
Answers
C.
Threat Extraction
C.
Threat Extraction
Answers
D.
Threat Cloud
D.
Threat Cloud
Answers
Suggested answer: B

Explanation:

Threat Simulator is not a component of Check Point SandBlast. Check Point SandBlast is a solution that provides advanced protection against zero-day threats using four components: Threat Emulation, Threat Extraction, Threat Cloud, and Threat Prevention.Reference:Check Point SandBlast Network

Full synchronization between cluster members is handled by Firewall Kernel. Which port is used for this?

A.
UDP port 265
A.
UDP port 265
Answers
B.
TCP port 265
B.
TCP port 265
Answers
C.
UDP port 256
C.
UDP port 256
Answers
D.
TCP port 256
D.
TCP port 256
Answers
Suggested answer: D

Explanation:

Full synchronization between cluster members is handled by Firewall Kernel using TCP port 256 by default. Full synchronization occurs when a cluster member joins or rejoins the cluster and needs to receive the entire state table from another member.Reference: [ClusterXL Administration Guide]

Total 626 questions
Go to page: of 63