ExamGecko
Home / Checkpoint / 156-315.81 / List of questions
Ask Question

Checkpoint 156-315.81 Practice Test - Questions Answers, Page 8

Add to Whishlist

List of questions

Question 71

Report Export Collapse

You want to gather and analyze threats to your mobile device. It has to be a lightweight app. Which application would you use?

SmartEvent Client Info
SmartEvent Client Info
SecuRemote
SecuRemote
Check Point Protect
Check Point Protect
Check Point Capsule Cloud
Check Point Capsule Cloud
Suggested answer: C
Explanation:

Check Point Protect is a lightweight app that can be used to gather and analyze threats to your mobile device.It provides real-time threat intelligence, device posture assessment, and secure browsing protection3. The other applications are either not designed for mobile devices, or do not offer threat analysis features.

Reference:R81 CCSA & CCSE exams released featuring Promo for... - Check Point ..., Check Point Protect - Apps on Google Play

asked 16/09/2024
Rajesh Gurav
33 questions

Question 72

Report Export Collapse

Which view is NOT a valid CPVIEW view?

IDA
IDA
RAD
RAD
PDP
PDP
VPN
VPN
Suggested answer: C
Explanation:

PDP is not a valid CPVIEW view. CPVIEW is a command-line tool that shows the status of different system parameters, such as CPU, memory, disk, network, and firewall. The valid views are IDA, RAD, VPN, FW, QoS, and others. PDP is a process that handles identity awareness and authentication.

Reference: Check Point R81 Gaia Administration Guide, Check Point Identity Awareness Administration Guide R81

asked 16/09/2024
Nicole Stevens
51 questions

Question 73

Report Export Collapse

Which of the following is a new R81 Gateway feature that had not been available in R77.X and older?

The rule base can be built of layers, each containing a set of the security rules. Layers are inspected in the order in which they are defined, allowing control over the rule base flow and which security functionalities take precedence.
The rule base can be built of layers, each containing a set of the security rules. Layers are inspected in the order in which they are defined, allowing control over the rule base flow and which security functionalities take precedence.
Limits the upload and download throughput for streaming media in the company to 1 Gbps.
Limits the upload and download throughput for streaming media in the company to 1 Gbps.
Time object to a rule to make the rule active only during specified times.
Time object to a rule to make the rule active only during specified times.
Sub Policies ae sets of rules that can be created and attached to specific rules. If the rule is matched, inspection will continue in the sub policy attached to it rather than in the next rule.
Sub Policies ae sets of rules that can be created and attached to specific rules. If the rule is matched, inspection will continue in the sub policy attached to it rather than in the next rule.
Suggested answer: D
Explanation:

Sub Policies are a new R81 Gateway feature that had not been available in R77.X and older. Sub Policies are sets of rules that can be created and attached to specific rules. If the rule is matched, inspection will continue in the sub policy attached to it rather than in the next rule. This allows for more granular and modular control over the policy. The other features were already available in previous versions .

Reference: Check Point R81 Security Management Administration Guide, Check Point R77 Security Management Administration Guide, Check Point R77 Gaia Administration Guide, Check Point R77 Security Gateway Technical Administration Guide

asked 16/09/2024
Ali Danial
41 questions

Question 74

Report Export Collapse

fwssd is a child process of which of the following Check Point daemons?

fwd
fwd
cpwd
cpwd
fwm
fwm
cpd
cpd
Suggested answer: A
Explanation:

fwssd is a child process of fwd, which is the firewall daemon that handles policy installation, logging, and state synchronization. cpwd is the watchdog process that monitors and restarts other processes. fwm is the management server process that handles communication with GUI clients. cpd is the infrastructure daemon that handles SIC, licensing, and policy code generation.

Reference: Check Point Processes Cheat Sheet -- LazyAdmins, Check Point R81 Gaia Administration Guide,Certified Security Expert (CCSE) R81.20 Course Overview

asked 16/09/2024
Nils Stelling
31 questions

Question 75

Report Export Collapse

Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.

Symmetric routing
Symmetric routing
Failovers
Failovers
Asymmetric routing
Asymmetric routing
Anti-Spoofing
Anti-Spoofing
Suggested answer: C
Explanation:

Sticky Decision Function (SDF) is required to prevent asymmetric routing in an Active-Active cluster. Asymmetric routing occurs when packets from a source to a destination follow a different path than packets from the destination to the source. This can cause problems with stateful inspection and NAT.SDF ensures that packets from the same connection are handled by the same cluster member1.

Reference:Check Point R81 ClusterXL Administration Guide

asked 16/09/2024
Sriharsha Janga
47 questions

Question 76

Report Export Collapse

CPM process stores objects, policies, users, administrators, licenses and management data in a database. The database is:

MySQL
MySQL
Postgres SQL
Postgres SQL
MarisDB
MarisDB
SOLR
SOLR
Suggested answer: B
Explanation:

CPM process stores objects, policies, users, administrators, licenses and management data in a Postgres SQL database.This database is located in$FWDIR/confand can be accessed using thepg_clientcommand2. The other options are not the correct database type for CPM.

Reference:Check Point R81 Security Management Administration Guide

asked 16/09/2024
Edwin Daneel
35 questions

Question 77

Report Export Collapse

If you needed the Multicast MAC address of a cluster, what command would you run?

cphaprob --a if
cphaprob --a if
cphaconf ccp multicast
cphaconf ccp multicast
cphaconf debug data
cphaconf debug data
cphaprob igmp
cphaprob igmp
Suggested answer: D
Explanation:

The commandcphaprob igmpcan be used to display the Multicast MAC address of a cluster.This command shows the IGMP (Internet Group Management Protocol) information for each cluster interface, including the VRID (Virtual Router ID), the Multicast IP address, and the Multicast MAC address3. The other commands do not show the Multicast MAC address information.

Reference:Check Point R81 ClusterXL Administration Guide

asked 16/09/2024
Janina Loveria
47 questions

Question 78

Report Export Collapse

Which is NOT an example of a Check Point API?

Gateway API
Gateway API
Management API
Management API
OPSC SDK
OPSC SDK
Threat Prevention API
Threat Prevention API
Suggested answer: A
Explanation:

Gateway API is not an example of a Check Point API. Check Point APIs are interfaces that enable interactions with Check Point products using automation scripts or external applications.The examples of Check Point APIs are Management API, OPSEC SDK, Threat Prevention API, Identity Awareness Web Services API, and others4. Gateway API is not a valid Check Point API name.

Reference:Check Point R81 Security Management Administration Guide, Check Point APIs

asked 16/09/2024
Kevin Zander
40 questions

Question 79

Report Export Collapse

What are the three components for Check Point Capsule?

Capsule Docs, Capsule Cloud, Capsule Connect
Capsule Docs, Capsule Cloud, Capsule Connect
Capsule Workspace, Capsule Cloud, Capsule Connect
Capsule Workspace, Capsule Cloud, Capsule Connect
Capsule Workspace, Capsule Docs, Capsule Connect
Capsule Workspace, Capsule Docs, Capsule Connect
Capsule Workspace, Capsule Docs, Capsule Cloud
Capsule Workspace, Capsule Docs, Capsule Cloud
Suggested answer: D
Explanation:

The three components for Check Point Capsule are Capsule Workspace, Capsule Docs, and Capsule Cloud. Capsule Workspace is a secure container app that allows users to access corporate data and applications from their mobile devices. Capsule Docs is a solution that protects documents with encryption and granular access control. Capsule Cloud is a cloud-based security service that enforces security policies on devices that are outside the corporate network.

Reference: Check Point Capsule

asked 16/09/2024
Paul Walker
43 questions

Question 80

Report Export Collapse

Which of the following Check Point processes within the Security Management Server is responsible for the receiving of log records from Security Gateway?

logd
logd
fwd
fwd
fwm
fwm
cpd
cpd
Suggested answer: B
Explanation:

The fwd process within the Security Management Server is responsible for the receiving of log records from Security Gateway.The fwd process handles the communication with the Security Gateways and log servers via TCP port 2571.The other processes have different roles, such as logd for writing logs to the database, fwm for handling GUI clients, and cpd for infrastructure tasks2.

Reference:Check Point Ports Used for Communication by Various Check Point Modules,Check Point Processes Cheat Sheet -- LazyAdmins

asked 16/09/2024
Latonya Ganison
30 questions
Total 626 questions
Go to page: of 63