ExamGecko
Home / Checkpoint / 156-315.81 / List of questions
Ask Question

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 6

Add to Whishlist

List of questions

Question 51

Report Export Collapse

Which command lists all tables in Gaia?

fw tab --t
fw tab --t
fw tab --list
fw tab --list
fw-tab --s
fw-tab --s
fw tab -1
fw tab -1
Suggested answer: C
Explanation:

The fw tab -s command lists all tables in Gaia. The fw tab command displays information about the firewall tables, such as connections, NAT translations, SAM rules, etc. The -s option shows a summary of all tables.Reference:fw tab - Check Point Support Center

asked 16/09/2024
Serhan Azdiken
46 questions

Question 52

Report Export Collapse

What is true about the IPS-Blade?

In R81, IPS is managed by the Threat Prevention Policy
In R81, IPS is managed by the Threat Prevention Policy
In R81, in the IPS Layer, the only three possible actions are Basic, Optimized and Strict
In R81, in the IPS Layer, the only three possible actions are Basic, Optimized and Strict
In R81, IPS Exceptions cannot be attached to ''all rules''
In R81, IPS Exceptions cannot be attached to ''all rules''
In R81, the GeoPolicy Exceptions and the Threat Prevention Exceptions are the same
In R81, the GeoPolicy Exceptions and the Threat Prevention Exceptions are the same
Suggested answer: A
Explanation:

In R81, IPS is managed by the Threat Prevention Policy. The Threat Prevention Policy is a unified policy that allows you to configure and enforce IPS, Anti-Bot, Anti-Virus, Threat Emulation, and Threat Extraction settings in one place.Reference:Threat Prevention Administration Guide

asked 16/09/2024
MARTIN WEAVER
42 questions

Question 53

Report Export Collapse

Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?

Detects and blocks malware by correlating multiple detection engines before users are affected.
Detects and blocks malware by correlating multiple detection engines before users are affected.
Configure rules to limit the available network bandwidth for specified users or groups.
Configure rules to limit the available network bandwidth for specified users or groups.
Use UserCheck to help users understand that certain websites are against the company's security policy.
Use UserCheck to help users understand that certain websites are against the company's security policy.
Make rules to allow or block applications and Internet sites for individual applications, categories, and risk levels.
Make rules to allow or block applications and Internet sites for individual applications, categories, and risk levels.
Suggested answer: A
Explanation:

Detecting and blocking malware by correlating multiple detection engines before users are affected is not a feature associated with the Check Point URL Filtering and Application Control Blade. This feature is part of the Check Point SandBlast Network solution, which uses Threat Emulation and Threat Extraction technologies to prevent zero-day attacks. The other features are part of the URL Filtering and Application Control Blade, which allows you to control access to web applications and sites based on various criteria.Reference:URL Filtering and Application Control Administration Guide

asked 16/09/2024
Brent Kehoe
38 questions

Question 54

Report Export Collapse

What is a feature that enables VPN connections to successfully maintain a private and secure VPN session without employing Stateful Inspection?

Stateful Mode
Stateful Mode
VPN Routing Mode
VPN Routing Mode
Wire Mode
Wire Mode
Stateless Mode
Stateless Mode
Suggested answer: C
Explanation:

Wire Mode is a VPN-1 NGX feature that enables VPN connections to successfully fail over, bypassing Security Gateway enforcement. This improves performance and reduces downtime. Based on a trusted source and destination, Wire Mode uses internal interfaces and VPN Communities to maintain a private and secure VPN session, without employing Stateful Inspection. Since Stateful Inspection no longer takes place, dynamic-routing protocols that do not survive state verification in non-Wire Mode configurations can now be deployed. The VPN connection is no different from any other connections along a dedicated wire, thus the meaning of 'Wire Mode'.

asked 16/09/2024
Manoj A Rajan
45 questions

Question 55

Report Export Collapse

What Factor preclude Secure XL Templating?

Source Port Ranges/Encrypted Connections
Source Port Ranges/Encrypted Connections
IPS
IPS
ClusterXL in load sharing Mode
ClusterXL in load sharing Mode
CoreXL
CoreXL
Suggested answer: A
Explanation:

SecureXL Templating is a feature that accelerates the processing of packets that belong to the same connection or session by creating a template for the first packet and applying it to the subsequent packets. SecureXL Templating is precluded by factors that prevent the creation of a template, such as source port ranges, encrypted connections, NAT, QoS, etc.Reference:SecureXL Mechanism

asked 16/09/2024
Kunle Fodeke
54 questions

Question 56

Report Export Collapse

In order to get info about assignment (FW, SND) of all CPUs in your SGW, what is the most accurate CLI command?

fw ctl sdstat
fw ctl sdstat
fw ctl affinity --l --a --r --v
fw ctl affinity --l --a --r --v
fw ctl multik stat
fw ctl multik stat
cpinfo
cpinfo
Suggested answer: B
Explanation:

The fw ctl affinity -l -a -r -v command is the most accurate CLI command to get info about assignment (FW, SND) of all CPUs in your SGW. This command displays the affinity settings of all interfaces and processes in a verbose mode, including the Firewall (FW) and Secure Network Distributor (SND) instances.Reference:CoreXL Administration Guide

asked 16/09/2024
Gbolahan Olukole
34 questions

Question 57

Report Export Collapse

Check Pont Central Deployment Tool (CDT) communicates with the Security Gateway / Cluster Members over Check Point SIC _______ .

TCP Port 18190
TCP Port 18190
TCP Port 18209
TCP Port 18209
TCP Port 19009
TCP Port 19009
TCP Port 18191
TCP Port 18191
Suggested answer: D
Explanation:

Check Point Central Deployment Tool (CDT) communicates with the Security Gateway / Cluster Members over Check Point SIC using TCP port 18191 by default. CDT is a tool that allows you to perform simultaneous configuration changes on multiple gateways or clusters using predefined commands or scripts.Reference:Check Point Central Deployment Tool (CDT)

asked 16/09/2024
Zuzana Combs
30 questions

Question 58

Report Export Collapse

The CPD daemon is a Firewall Kernel Process that does NOT do which of the following?

Secure Internal Communication (SIC)
Secure Internal Communication (SIC)
Restart Daemons if they fail
Restart Daemons if they fail
Transfers messages between Firewall processes
Transfers messages between Firewall processes
Pulls application monitoring status
Pulls application monitoring status
Suggested answer: D
Explanation:

The CPD daemon is a Firewall Kernel Process that does not pull application monitoring status. The CPD daemon is responsible for Secure Internal Communication (SIC), restarting daemons if they fail, transferring messages between Firewall processes, and managing policy installation.Reference:CPD process

asked 16/09/2024
Habte Manna
30 questions

Question 59

Report Export Collapse

What is not a component of Check Point SandBlast?

Threat Emulation
Threat Emulation
Threat Simulator
Threat Simulator
Threat Extraction
Threat Extraction
Threat Cloud
Threat Cloud
Suggested answer: B
Explanation:

Threat Simulator is not a component of Check Point SandBlast. Check Point SandBlast is a solution that provides advanced protection against zero-day threats using four components: Threat Emulation, Threat Extraction, Threat Cloud, and Threat Prevention.Reference:Check Point SandBlast Network

asked 16/09/2024
Martin Stoyanov
54 questions

Question 60

Report Export Collapse

Full synchronization between cluster members is handled by Firewall Kernel. Which port is used for this?

UDP port 265
UDP port 265
TCP port 265
TCP port 265
UDP port 256
UDP port 256
TCP port 256
TCP port 256
Suggested answer: D
Explanation:

Full synchronization between cluster members is handled by Firewall Kernel using TCP port 256 by default. Full synchronization occurs when a cluster member joins or rejoins the cluster and needs to receive the entire state table from another member.Reference: [ClusterXL Administration Guide]

asked 16/09/2024
Wilker Aguiar
51 questions
Total 626 questions
Go to page: of 63