Checkpoint 156-315.81 Exam Practice Questions (P. 1)
- Full Access (344 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #1
In order for changes made to policy to be enforced by a Security Gateway, what action must an administrator perform?
- APublish changes
- BSave changes
- CInstall policyMost Voted
- DInstall database
Correct Answer:
D
D

The correct action required to enforce changes made to a security policy on a Security Gateway is "Install Policy." The command effectively deploys and updates the gateway with the latest policy configurations set by the administrator. The function to "Install Database" primarily relates to updates made in Global Properties. Therefore, policy changes reflect on the gateway only through the "Install Policy" command. This clarification aligns with best practices for managing Check Point Security Gateways.
send
light_mode
delete
Question #2
Name the file that is an electronically signed file used by Check Point to translate the features in the license into a code?
- ABoth License (.lic) and Contract (.xml) files
- Bcp.macroMost Voted
- CContract file (.xml)
- Dlicense File (.lic)
Correct Answer:
D
D

The correct file used by Check Point to translate license features into code is actually the cp.macro file. While it might seem intuitive to think that this role is played by the license file (.lic), the cp.macro does the specific job of translating the installed licenses' features into executable code by Check Point software. This ensures that the software continuously supports both old and new features across different versions, included in each software release. So, remember, when you think about translation of license features to code, think cp.macro, not just the .lic file!
send
light_mode
delete
Question #3
Which two Identity Awareness daemons are used to support identity sharing?
- APolicy Activation Point (PAP) and Policy Decision Point (PDP)
- BPolicy Manipulation Point (PMP) and Policy Activation Point (PAP)
- CPolicy Enforcement Point (PEP) and Policy Manipulation Point (PMP)
- DPolicy Decision Point (PDP) and Policy Enforcement Point (PEP)Most Voted
Correct Answer:
D
D

The correct daemons for supporting identity sharing in Check Point’s Identity Awareness are indeed the Policy Decision Point (PDP) and Policy Enforcement Point (PEP). These components work together where PDP makes decisions about permissions while PEP enforces those decisions, effectively managing identity across different network environments. This configuration ensures that proper identity-based rules are applied consistently throughout the protected network.
send
light_mode
delete
Question #4
In which scenario will an administrator need to manually define Proxy ARP?
- AWhen they configure an "Automatic Static NAT" which translates to an IP address that does not belong to one of the firewall’s interfaces.
- BWhen they configure an "Automatic Hide NAT" which translates to an IP address that does not belong to one of the firewall’s interfaces.
- CWhen they configure a "Manual Static NAT" which translates to an IP address that does not belong to one of the firewall’s interfaces.Most Voted
- DWhen they configure a "Manual Hide NAT" which translates to an IP address that belongs to one of the firewall’s interfaces.
Correct Answer:
C
C

In scenarios where you're dealing with Manual Static NAT and the IP address meant for translation isn't part of the firewall's interfaces, proxy ARP needs to be set up manually. This ensures that the gateway can handle traffic intended for that translated IP, effectively enhancing network management and security.
send
light_mode
delete
Question #5
Rugged appliances are small appliances with ruggedized hardware and like Quantum Spark appliance they use which operating system?
- ACentos Linux
- BGaia embedded.
- CGaia
- DRed Hat Enterprise Linux version 5
Correct Answer:
B
B

The correct answer is B, Gaia Embedded. This reflects the nature of Quantum Spark appliance series which utilizes an embedded version specifically tailored for optimal performance in rugged hardware environments. The documentation clearly specifies Gaia as the operating system base, with an embedded configuration to meet the specialized requirements of these durable devices. This information can be verified in the official Check Point documentation for the Quantum Spark series. Hence, Gaia Embedded is suitable and precise for rugged appliances, corresponding directly to Check Point’s tailored solution for these models.
send
light_mode
delete
Question #6
For Automatic Hide NAT rules created by the administrator what is a TRUE statement?
- ASource Port Address Translation (PAT) is enabled by default.Most Voted
- BAutomatic NAT rules are supported for Network objects only.
- CAutomatic NAT rules are supported for Host objects only.
- DSource Port Address Translation (PAT) is disabled by default.
Correct Answer:
A
A

When working with Automatic Hide NAT configurations in Check Point, it's important to remember that Source Port Address Translation (PAT) is enabled by default. This setup ensures unique source port numbers in the outgoing packets when multiple internal hosts share a single IP address, effectively preventing IP address overlapping during the translation process. This feature is integral to maintaining session uniqueness and proper traffic routing.
send
light_mode
delete
Question #7
What technologies are used to deny or permit network traffic?
- AStateful Inspection, Firewall Blade, and URL/Application Blade
- BPacket Filtering, Stateful Inspection, and Application Layer FirewallMost Voted
- CFirewall Blade, URL/Application Blade, and IPS
- DStateful Inspection, URL/Application Blade, and Threat Prevention
Correct Answer:
C
C

The correct technologies crucial in the context of denying or permitting network traffic largely revolve around your firewall configurations and the types of blades enabled within those configurations. Specifically, the Firewall Blade functions as your primary gatekeeper, dictating basic accept or deny rules based on predefined security policies. Concurrently, the URL/Application Blade offers refined control by inspecting and regulating access to websites and applications. The IPS (Intrusion Prevention System) blade is pivotal in examining traffic flows for malicious activities or known threats, hence preventing potential security breaches by blocking such traffic. These components work in tandem to effectively manage and safeguard network traffic.
send
light_mode
delete
Question #8
Identity Awareness allows easy configuration for network access and auditing based on what three items?
- AClient machine IP address.
- BNetwork location, the identity of a user and the identity of a machine.Most Voted
- CLog server IP address.
- DGateway proxy IP address.
Correct Answer:
B
B

Absolutely right! Identity Awareness is all about the where, who, and what—where they're accessing from, who's behind the keyboard, and what device they're using. Think of it like the bouncer checking your ID, your address, and whether you've got the right keys to the place. This detailed setup beefs up security by ensuring the right people and devices are in the right locations. Spot-on thinking for a security-focused environment!
send
light_mode
delete
Question #9
Using AD Query, the security gateway connections to the Active Directory Domain Controllers using what protocol?
- AWindows Management Instrumentation (WMI)Most Voted
- BHypertext Transfer Protocol Secure (HTTPS)
- CLightweight Directory Access Protocol (LDAP)
- DRemote Desktop Protocol (RDP)
Correct Answer:
C
C

The AD Query connects to Active Directory Domain Controllers using the Lightweight Directory Access Protocol (LDAP). LDAP is specifically designed to access and maintain directory information services over an IP network. While some comments suggest that Windows Management Instrumentation (WMI) is used for querying Active Directory security logs, this applies to extracting log data rather than the direct connection method implemented by AD Query for identity awareness, which primarily uses LDAP to authenticate and extract user information directly from AD.
send
light_mode
delete
Question #10
What are the types of Software Containers?
- ASmart Console, Security Management, and Security Gateway
- BSecurity Management, Security Gateway, and Endpoint SecurityMost Voted
- CSecurity Management, Log & Monitoring, and Security Policy
- DSecurity Management, Standalone, and Security Gateway
Correct Answer:
B
B

The correct types of Software Containers are indeed Security Management, Security Gateway, and Endpoint Security. These components are the backbone of Check Point Software Blade Architecture, each serving unique functions. Security Management for overseeing security operations, Security Gateway for filtering traffic, and Endpoint Security focusing on client-side protection. This categorization effectively outlines the distinct roles each container plays within network security infrastructure.
send
light_mode
delete
All Pages