ExamGecko
Home Home / Checkpoint / 156-315.81

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 8

Question list
Search
Search

You want to gather and analyze threats to your mobile device. It has to be a lightweight app. Which application would you use?

A.
SmartEvent Client Info
A.
SmartEvent Client Info
Answers
B.
SecuRemote
B.
SecuRemote
Answers
C.
Check Point Protect
C.
Check Point Protect
Answers
D.
Check Point Capsule Cloud
D.
Check Point Capsule Cloud
Answers
Suggested answer: C

Explanation:

Check Point Protect is a lightweight app that can be used to gather and analyze threats to your mobile device.It provides real-time threat intelligence, device posture assessment, and secure browsing protection3. The other applications are either not designed for mobile devices, or do not offer threat analysis features.

Reference:R81 CCSA & CCSE exams released featuring Promo for... - Check Point ..., Check Point Protect - Apps on Google Play

Which view is NOT a valid CPVIEW view?

A.
IDA
A.
IDA
Answers
B.
RAD
B.
RAD
Answers
C.
PDP
C.
PDP
Answers
D.
VPN
D.
VPN
Answers
Suggested answer: C

Explanation:

PDP is not a valid CPVIEW view. CPVIEW is a command-line tool that shows the status of different system parameters, such as CPU, memory, disk, network, and firewall. The valid views are IDA, RAD, VPN, FW, QoS, and others. PDP is a process that handles identity awareness and authentication.

Reference: Check Point R81 Gaia Administration Guide, Check Point Identity Awareness Administration Guide R81

Which of the following is a new R81 Gateway feature that had not been available in R77.X and older?

A.
The rule base can be built of layers, each containing a set of the security rules. Layers are inspected in the order in which they are defined, allowing control over the rule base flow and which security functionalities take precedence.
A.
The rule base can be built of layers, each containing a set of the security rules. Layers are inspected in the order in which they are defined, allowing control over the rule base flow and which security functionalities take precedence.
Answers
B.
Limits the upload and download throughput for streaming media in the company to 1 Gbps.
B.
Limits the upload and download throughput for streaming media in the company to 1 Gbps.
Answers
C.
Time object to a rule to make the rule active only during specified times.
C.
Time object to a rule to make the rule active only during specified times.
Answers
D.
Sub Policies ae sets of rules that can be created and attached to specific rules. If the rule is matched, inspection will continue in the sub policy attached to it rather than in the next rule.
D.
Sub Policies ae sets of rules that can be created and attached to specific rules. If the rule is matched, inspection will continue in the sub policy attached to it rather than in the next rule.
Answers
Suggested answer: D

Explanation:

Sub Policies are a new R81 Gateway feature that had not been available in R77.X and older. Sub Policies are sets of rules that can be created and attached to specific rules. If the rule is matched, inspection will continue in the sub policy attached to it rather than in the next rule. This allows for more granular and modular control over the policy. The other features were already available in previous versions .

Reference: Check Point R81 Security Management Administration Guide, Check Point R77 Security Management Administration Guide, Check Point R77 Gaia Administration Guide, Check Point R77 Security Gateway Technical Administration Guide

fwssd is a child process of which of the following Check Point daemons?

A.
fwd
A.
fwd
Answers
B.
cpwd
B.
cpwd
Answers
C.
fwm
C.
fwm
Answers
D.
cpd
D.
cpd
Answers
Suggested answer: A

Explanation:

fwssd is a child process of fwd, which is the firewall daemon that handles policy installation, logging, and state synchronization. cpwd is the watchdog process that monitors and restarts other processes. fwm is the management server process that handles communication with GUI clients. cpd is the infrastructure daemon that handles SIC, licensing, and policy code generation.

Reference: Check Point Processes Cheat Sheet -- LazyAdmins, Check Point R81 Gaia Administration Guide,Certified Security Expert (CCSE) R81.20 Course Overview

Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.

A.
Symmetric routing
A.
Symmetric routing
Answers
B.
Failovers
B.
Failovers
Answers
C.
Asymmetric routing
C.
Asymmetric routing
Answers
D.
Anti-Spoofing
D.
Anti-Spoofing
Answers
Suggested answer: C

Explanation:

Sticky Decision Function (SDF) is required to prevent asymmetric routing in an Active-Active cluster. Asymmetric routing occurs when packets from a source to a destination follow a different path than packets from the destination to the source. This can cause problems with stateful inspection and NAT.SDF ensures that packets from the same connection are handled by the same cluster member1.

Reference:Check Point R81 ClusterXL Administration Guide

CPM process stores objects, policies, users, administrators, licenses and management data in a database. The database is:

A.
MySQL
A.
MySQL
Answers
B.
Postgres SQL
B.
Postgres SQL
Answers
C.
MarisDB
C.
MarisDB
Answers
D.
SOLR
D.
SOLR
Answers
Suggested answer: B

Explanation:

CPM process stores objects, policies, users, administrators, licenses and management data in a Postgres SQL database.This database is located in$FWDIR/confand can be accessed using thepg_clientcommand2. The other options are not the correct database type for CPM.

Reference:Check Point R81 Security Management Administration Guide

If you needed the Multicast MAC address of a cluster, what command would you run?

A.
cphaprob --a if
A.
cphaprob --a if
Answers
B.
cphaconf ccp multicast
B.
cphaconf ccp multicast
Answers
C.
cphaconf debug data
C.
cphaconf debug data
Answers
D.
cphaprob igmp
D.
cphaprob igmp
Answers
Suggested answer: D

Explanation:

The commandcphaprob igmpcan be used to display the Multicast MAC address of a cluster.This command shows the IGMP (Internet Group Management Protocol) information for each cluster interface, including the VRID (Virtual Router ID), the Multicast IP address, and the Multicast MAC address3. The other commands do not show the Multicast MAC address information.

Reference:Check Point R81 ClusterXL Administration Guide

Which is NOT an example of a Check Point API?

A.
Gateway API
A.
Gateway API
Answers
B.
Management API
B.
Management API
Answers
C.
OPSC SDK
C.
OPSC SDK
Answers
D.
Threat Prevention API
D.
Threat Prevention API
Answers
Suggested answer: A

Explanation:

Gateway API is not an example of a Check Point API. Check Point APIs are interfaces that enable interactions with Check Point products using automation scripts or external applications.The examples of Check Point APIs are Management API, OPSEC SDK, Threat Prevention API, Identity Awareness Web Services API, and others4. Gateway API is not a valid Check Point API name.

Reference:Check Point R81 Security Management Administration Guide, Check Point APIs

What are the three components for Check Point Capsule?

A.
Capsule Docs, Capsule Cloud, Capsule Connect
A.
Capsule Docs, Capsule Cloud, Capsule Connect
Answers
B.
Capsule Workspace, Capsule Cloud, Capsule Connect
B.
Capsule Workspace, Capsule Cloud, Capsule Connect
Answers
C.
Capsule Workspace, Capsule Docs, Capsule Connect
C.
Capsule Workspace, Capsule Docs, Capsule Connect
Answers
D.
Capsule Workspace, Capsule Docs, Capsule Cloud
D.
Capsule Workspace, Capsule Docs, Capsule Cloud
Answers
Suggested answer: D

Explanation:

The three components for Check Point Capsule are Capsule Workspace, Capsule Docs, and Capsule Cloud. Capsule Workspace is a secure container app that allows users to access corporate data and applications from their mobile devices. Capsule Docs is a solution that protects documents with encryption and granular access control. Capsule Cloud is a cloud-based security service that enforces security policies on devices that are outside the corporate network.

Reference: Check Point Capsule

Which of the following Check Point processes within the Security Management Server is responsible for the receiving of log records from Security Gateway?

A.
logd
A.
logd
Answers
B.
fwd
B.
fwd
Answers
C.
fwm
C.
fwm
Answers
D.
cpd
D.
cpd
Answers
Suggested answer: B

Explanation:

The fwd process within the Security Management Server is responsible for the receiving of log records from Security Gateway.The fwd process handles the communication with the Security Gateways and log servers via TCP port 2571.The other processes have different roles, such as logd for writing logs to the database, fwm for handling GUI clients, and cpd for infrastructure tasks2.

Reference:Check Point Ports Used for Communication by Various Check Point Modules,Check Point Processes Cheat Sheet -- LazyAdmins

Total 626 questions
Go to page: of 63