Checkpoint 156-315.81 Exam Practice Questions (P. 2)
- Full Access (344 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #11
What are the Threat Prevention software components available on the Check Point Security Gateway?
- AIPS, Threat Emulation and Threat Extraction
- BIPS, Anti-Bot, Anti-Virus, SandBlast and Macro Extraction
- CIPS, Anti-Bot, Anti-Virus, Threat Emulation and Threat ExtractionMost Voted
- DIDS, Forensics, Anti-Virus, Sandboxing
Correct Answer:
B
B

In the context of Threat Prevention software components for the Check Point Security Gateway, it's crucial to distinguish between actual product offerings and mislabeled terms. In official Check Point documentation, including the R81 Threat Prevention Administration Guide, the components listed are IPS, Anti-Bot, Anti-Virus, Threat Extraction, and Threat Emulation. Notably, 'Macro Extraction' does not exist within Check Point's suite; the correct term is 'Threat Extraction'. Always consult the latest official guides to ensure accuracy in configurations and knowledge about available security components.
send
light_mode
delete
Question #12
When using Automatic Hide NAT, what is enabled by default?
- ASource Port Address Translation (PAT)Most Voted
- BStatic NAT
- CStatic Route
- DHTTPS Inspection
Correct Answer:
A
A

For Automatic Hide NAT, Source Port Address Translation (PAT) is indeed enabled by default. This setting ensures that multiple internal IP addresses can be mapped to a single external IP while differentiating traffic based on the source port number. This is particularly essential in conserving IP addresses and maintaining sessions in a NAT environment. This feature's default enablement facilitates smoother initial NAT configurations, avoiding the need for manual setups for basic NAT operations.
send
light_mode
delete
Question #13
In which deployment is the security management server and Security Gateway installed on the same appliance?
- AStandaloneMost Voted
- BRemote
- CDistributed
- DBridge Mode
Correct Answer:
A
A

Indeed, a Standalone deployment is identified by the combination of both the Security Gateway and Security Management Server on a singular appliance. This setup is quite practical for smaller environments or specific scenarios where simplicity and consolidated management are prioritized. It's a traditional choice that allows for straightforward management and maintenance without the need to juggle multiple machines or complex configurations.
send
light_mode
delete
Question #14
What is the main objective when using Application Control?
- ATo filter out specific content.
- BTo assist the firewall blade with handling traffic.
- CTo see what users are doing.
- DEnsure security and privacy of information.Most Voted
Correct Answer:
A
A

The correct choice, which is to filter out specific content, indeed aligns with what Application Control's fundamental goal is. This feature is significant in networking and security because it enables precise control over applications by burgeoning policies aimed at managing, identifying, and blocking usage based on specific needs. Importantly, while Application Control enhances security by regulating application use, it should not be mistaken for ensuring total privacy or merely observing user behavior. Hence, Option A aligns perfectly with Application Control's primary function of filtering traffic as per organizational policies and needs.
send
light_mode
delete
Question #15
Gaia has two default user accounts that cannot be deleted. What are those user accounts?
- AAdmin and Default
- BExpert and Clish
- CControl and Monitor
- DAdmin and MonitorMost Voted
Correct Answer:
D
D

Correct choice here is Admin and Monitor. According to the Gaia R81 Administration Guide section on User Management, admin and monitor are indeed the two default user accounts that are created automatically and cannot be deleted because they're essential for system management and monitoring.
send
light_mode
delete
Question #16
When changes are made to a Rule base, It is important to __________ to enforce changes.
send
light_mode
delete
Question #17
Why is a Central License the preferred and recommended method of licensing?
- ACentral Licensing actually not supported with Gaia.
- BCentral Licensing is the only option when deploying Gala.
- CCentral Licensing ties to the IP address of a gateway and can be changed to any gateway if needed.
- DCentral Licensing ties to the IP address of the management server and is not dependent on the IP of any gateway in the event it changes.Most Voted
Correct Answer:
D
D
send
light_mode
delete
Question #18
What does the "unknown" SIC status shown on SmartConsole mean?
- ASIC activation key requires a reset
- BAdministrator input the wrong SIC key
- CThe management can contact the Security Gateway but cannot establish Secure Internal Communication
- DThere is no connection between the Security Gateway and Security Management ServerMost Voted
Correct Answer:
D
D
send
light_mode
delete
Question #19
What are valid authentication methods for mutual authenticating the VPN gateways?
- APKI Certificates and Kerberos Tickets
- BPKI Certificates and DynamicID OTP
- CPre-Shared Secrets and Kerberos Ticket
- DPre-shared Secret and PKI CertificatesMost Voted
Correct Answer:
D
D
send
light_mode
delete
Question #20
What are the correct steps upgrading a HA cluster (M1 is active, M2 is passive) using Multi-Version Cluster(MVC)Upgrade?
- A1) Enable the MVC mechanism on both cluster members #cphaprob mvc on
2) Upgrade the passive node M2 to R81.10
3) In SmartConsole, change the version of the cluster object
4) Install the Access Control Policy and make sure that the installation will not stop if installation on one cluster member fails
5) After examine the cluster states upgrade node M1 to R81.10
6) On each Cluster Member, disable the MVC mechanism - B1) Enable the MVC mechanism on both cluster members #cphaprob mvc on
2) Upgrade the passive node M2 to R81.10
3) In SmartConsole, change the version of the cluster object
4) Install the Access Control Policy
5) After examine the cluster states upgrade node M1 to R81.10
6) On each Cluster Member, disable the MVC mechanism and Install the Access Control Policy - C1) In SmartConsole, change the version of the cluster object
2) Upgrade the passive node M2 to R81.10
3) Enable the MVC mechanism on the upgraded R81.10 Cluster Member M2 #cphaconf mvc on
4) Install the Access Control Policy and make sure that the installation will not stop if installation on one cluster member fails
5) After examine the cluster states upgrade node M1 to R81.10
6) On each Cluster Member, disable the MVC mechanism and Install the Access Control Policy SmartConsole, change the version of the cluster objectMost Voted - D1) Upgrade the passive node M2 to R81.10
2) Enable the MVC mechanism on the upgraded R81.10 Cluster Member M2 #cphaconf mvc on
3) In SmartConsole, change the version of the cluster object
4) Install the Access Control Policy
5) After examine the cluster states upgrade node M1 to R81.10
6) On each Cluster Member, disable the MVC mechanism and Install the Access Control Policy upgrade the passive node M2 to R81.10
Correct Answer:
С
С
send
light_mode
delete
All Pages