ExamGecko
Home Home / Checkpoint / 156-315.81

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 62

Question list
Search
Search

What destination versions are supported for a Multi-Version Cluster Upgrade?

A.
R77.30 and later
A.
R77.30 and later
Answers
B.
R80.10 and Later
B.
R80.10 and Later
Answers
C.
R70 and Later
C.
R70 and Later
Answers
D.
R76 and later
D.
R76 and later
Answers
Suggested answer: B

Explanation:

The correct answer is B) R80.10 and later.

According to the Check Point documentation1, the Multi-Version Cluster Upgrade (MVC) is a new feature in R80.40 and higher that replaces the Connectivity Upgrade (CU) method. MVC allows you to upgrade a cluster to a newer version without a loss in connectivity and test the new version on some of the cluster members before you decide to upgrade the rest of the cluster members. The MVC feature supports the following destination versions2:

R80.10

R80.20

R80.30

R80.40

R81

R81.20

The other options are incorrect because they are either not supported by MVC or they are older than the source version (R80.40).

Multi-Version Cluster (MVC) replaces Connectivity Upgrade (CU) in R80.401

ClusterXL upgrade methods and paths2

Which of the following is true regarding the Proxy ARP feature for Manual NAT?

A.
The local.arp file must always be configured
A.
The local.arp file must always be configured
Answers
B.
Automatic proxy ARP configuration can be enabled
B.
Automatic proxy ARP configuration can be enabled
Answers
C.
fw ctl proxy should be configured
C.
fw ctl proxy should be configured
Answers
D.
Translate Destination on Client Side should be configured
D.
Translate Destination on Client Side should be configured
Answers
Suggested answer: B

Explanation:

The verified answer is B) Automatic proxy ARP configuration can be enabled.

Proxy ARP is a feature that allows a gateway to respond to ARP requests on behalf of another IP address that is not on the same network segment. Proxy ARP is required for manual NAT rules when the NATed IP addresses are not routed to the gateway1.

By default, proxy ARP for manual NAT rules has to be configured manually by editing the local.arp file or using the CLISH commands on the gateway2. However, since R80.10, there is an option to enable automatic proxy ARP configuration for manual NAT rules by modifying the files $CPDIR/tmp/.CPprofile.sh and $CPDIR/tmp/.CPprofile.csh on the gateway3.

fw ctl proxy is a command that displays the proxy ARP table on the gateway, but it does not configure proxy ARP4.

Translate Destination on Client Side is a NAT option that determines whether the destination IP address is translated before or after the routing decision. It does not affect proxy ARP.

Configuring Proxy ARP for Manual NAT - Check Point Software1

R80.10: Automatic Proxy ARP with Manual NAT rules - checkpoint<dot>engineer2

Automatic creation of Proxy ARP for Manual NAT rules on Security Gateway R80.103

fw ctl proxy - Check Point Software

NAT Properties - Check Point Software

What are the Threat Prevention software components available on the Check Point Security Gateway?

A.
IPS, Threat Emulation and Threat Extraction
A.
IPS, Threat Emulation and Threat Extraction
Answers
B.
IPS, Anti-Bot, Anti-Virus, SandBlast and Macro Extraction
B.
IPS, Anti-Bot, Anti-Virus, SandBlast and Macro Extraction
Answers
C.
IPS, Anti-Bot, Anti-Virus, Threat Emulation and Threat Extraction
C.
IPS, Anti-Bot, Anti-Virus, Threat Emulation and Threat Extraction
Answers
D.
IDS, Forensics, Anti-Virus, Sandboxing
D.
IDS, Forensics, Anti-Virus, Sandboxing
Answers
Suggested answer: C

Explanation:

The Threat Prevention software components available on the Check Point Security Gateway are IPS, Anti-Bot, Anti-Virus, Threat Emulation and Threat Extraction. These components provide comprehensive protection against various types of cyber threats, such as network attacks, malware, ransomware, phishing, zero-day exploits, data leakage, and more. IPS is a network security component that detects and prevents malicious traffic based on signatures, behavioral patterns, and anomaly detection. Anti-Bot is a network security component that detects and blocks botnet communications and command-and-control servers. Anti-Virus is a network security component that scans files for known viruses, worms, and trojans. Threat Emulation is a network security component that emulates files in a sandbox environment to detect unknown malware and prevent zero-day attacks. Threat Extraction is a network security component that removes malicious content from files and delivers clean files to users.

Reference: [Check Point R81 Threat Prevention Administration Guide], page 9-10

Alice & Bob are going to deploy Management Data Plane Separation (MDPS) for all their Check Point Security Gateway(s)/Cluster(s). Which of the following statement is true?

A.
Each network environment is dependent and includes interfaces, routes, sockets, and processes
A.
Each network environment is dependent and includes interfaces, routes, sockets, and processes
Answers
B.
Management Plane -- To access, provision and monitor the Security Gateway
B.
Management Plane -- To access, provision and monitor the Security Gateway
Answers
C.
Data Plane -- To access, provision and monitor the Security Gateway
C.
Data Plane -- To access, provision and monitor the Security Gateway
Answers
D.
Management Plane -- for all other network traffic and processing
D.
Management Plane -- for all other network traffic and processing
Answers
Suggested answer: B

Explanation:

Management Data Plane Separation (MDPS) is a feature that allows the separation of the management plane and the data plane on a Security Gateway or a cluster. The management plane is responsible for accessing, provisioning and monitoring the Security Gateway, while the data plane is responsible for all other network traffic and processing.Each network environment is independent and includes interfaces, routes, sockets, and processes1.

Reference:Check Point R81 Administration Guide

In order for changes made to policy to be enforced by a Security Gateway, what action must an administrator perform?

A.
Publish changes
A.
Publish changes
Answers
B.
Save changes
B.
Save changes
Answers
C.
Install policy
C.
Install policy
Answers
D.
Install database
D.
Install database
Answers
Suggested answer: C

Explanation:

In order for changes made to policy to be enforced by a Security Gateway, an administrator must perform the action of installing policy. Installing policy is the process of transferring the policy package from the Security Management Server to the Security Gateway. Publishing changes is the process of saving changes to the database and making them available to other administrators.Saving changes is the process of saving changes to a session without publishing them2.

Reference:Check Point R81 Security Management Guide

The Check Point installation history feature in provides the following:

A.
View install changes and install specific version
A.
View install changes and install specific version
Answers
B.
Policy Installation Date only
B.
Policy Installation Date only
Answers
C.
Policy Installation Date, view install changes and install specific version
C.
Policy Installation Date, view install changes and install specific version
Answers
D.
View install changes
D.
View install changes
Answers
Suggested answer: C

Explanation:

The Check Point installation history feature provides the following:

Policy Installation Date: The date and time when the policy was installed on the Security Gateway.

View install changes: The ability to view the differences between two policy versions that were installed on the Security Gateway.

Install specific version: The ability to install a specific policy version from the installation history on the Security Gateway3.

Reference:Check Point R81 SmartConsole Guide

Rugged appliances are small appliances with ruggedized hardware and like Quantum Spark appliance they use which operating system?

A.
Centos Linux
A.
Centos Linux
Answers
B.
Gaia embedded.
B.
Gaia embedded.
Answers
C.
Gaia
C.
Gaia
Answers
D.
Red Hat Enterprise Linux version 5
D.
Red Hat Enterprise Linux version 5
Answers
Suggested answer: B

Explanation:

Rugged appliances are small appliances with ruggedized hardware that are designed for harsh environments. Like Quantum Spark appliances, they use Gaia embedded as their operating system. Gaia embedded is a lightweight version of Gaia that supports a subset of features and commands.

Reference: [Check Point R81 Gaia Embedded Administration Guide]

What is the biggest benefit of policy layers?

A.
To break one policy into several virtual policies
A.
To break one policy into several virtual policies
Answers
B.
Policy Layers and Sub-Policies enable flexible control over the security policy
B.
Policy Layers and Sub-Policies enable flexible control over the security policy
Answers
C.
They improve the performance on OS kernel version 3.0
C.
They improve the performance on OS kernel version 3.0
Answers
D.
To include Threat Prevention as a sub policy for the firewall policy
D.
To include Threat Prevention as a sub policy for the firewall policy
Answers
Suggested answer: B

Explanation:

The biggest benefit of policy layers is that they enable flexible control over the security policy. Policy layers and sub-policies allow administrators to break one policy into several virtual policies, each with its own set of rules and actions. Policy layers can be ordered, shared, and reused across different policies. Policy layers can also include Threat Prevention as a sub-policy for the firewall policy.

Reference: [Check Point R81 Security Management Guide]

What ports are used for SmartConsole to connect to the Security Management Server?

A.
CPMI (18190)
A.
CPMI (18190)
Answers
B.
ICA_Pull (18210), CPMI (18190) https (443)
B.
ICA_Pull (18210), CPMI (18190) https (443)
Answers
C.
CPM (19009), CPMI (18190) https (443)
C.
CPM (19009), CPMI (18190) https (443)
Answers
D.
CPM (19009), CPMI (18190) CPD (18191)
D.
CPM (19009), CPMI (18190) CPD (18191)
Answers
Suggested answer: C

Explanation:

The correct answer is C) CPM (19009), CPMI (18190) https (443).

SmartConsole is a client application that connects to the Security Management Server to manage and configure the security policy and objects. SmartConsole uses three ports to communicate with the Security Management Server1:

CPM (19009): This port is used for the communication between the SmartConsole client and the Check Point Management (CPM) process on the Security Management Server. The CPM process handles the database operations and the policy installation.

CPMI (18190): This port is used for the communication between the SmartConsole client and the Check Point Management Interface (CPMI) process on the Security Management Server. The CPMI process handles the authentication and encryption of the SmartConsole sessions.

https (443): This port is used for the communication between the SmartConsole client and the web server on the Security Management Server. The web server provides the SmartConsole GUI and the SmartConsole extensions.

The other options are incorrect because they either include ports that are not used by SmartConsole or omit ports that are used by SmartConsole.

SmartConsole R81.20 - Check Point Software1

After upgrading the primary security management server from R80.40 to R81.10 Bob wants to use the central deployment in SmartConsole R81.10 for the first time. How many installations (e.g. Jumbo Hotfix, Hotfixes or Upgrade Packages) can run of such at the same time:

A.
Up to 5 gateways
A.
Up to 5 gateways
Answers
B.
only 1 gateway
B.
only 1 gateway
Answers
C.
Up to 10 gateways
C.
Up to 10 gateways
Answers
D.
Up to 3 gateways
D.
Up to 3 gateways
Answers
Suggested answer: C

Explanation:

According to the Check Point R81.20 documentation, the central deployment feature allows you to install up to 10 packages simultaneously on multiple gateways1.

Reference

1:Check Point R81.20 Administration Guide, page 35.

Total 626 questions
Go to page: of 63