156-315.81 Exam Questions

Total 422 Questions

Last Updated Exam : 27-Dec-2024

You want to gather data and analyze threats to your mobile device. It has to be a lightweight app. Which application would you use?


A. Check Point Capsule Cloud


B. Sandblast Mobile Protect


C. SecuRemote


D. SmartEvent Client Info





B.
  Sandblast Mobile Protect

Explanation: SandBlast Mobile Protect is an application that provides comprehensive protection for mobile devices against cyber threats. SandBlast Mobile Protect is a lightweight app that does not affect the device performance or battery life. It monitors network traffic, device behavior, and installed apps to detect and prevent attacks such as phishing, malware, ransomware, botnets, and man-in-the-middle5. SandBlast Mobile Protect also integrates with Check Point’s ThreatCloud intelligence network to provide real-time threat information and updates6. Therefore, the correct answer is B.

Which command collects diagnostic data for analyzing a customer setup remotely?


A. cpv


B. cpinfo


C. migrate export


D. sysinfo





B.
  cpinfo

From SecureXL perspective, what are the three paths of traffic flow:


A. Initial Path; Medium Path; Accelerated Path


B. Layer Path; Blade Path; Rule Path


C. Firewall Path; Accelerated Path; Medium Path


D. Firewall Path; Accept Path; Drop Path





C.
  Firewall Path; Accelerated Path; Medium Path

Explanation: From SecureXL perspective, the three paths of traffic flow are Firewall Path, Accelerated Path, and Medium Path. Firewall Path is the path that handles packets that are not processed by SecureXL and are sent to the Firewall kernel for inspection. Accelerated Path is the path that handles packets that are processed by SecureXL and bypass the Firewall kernel. Medium Path is the path that handles packets that are partially processed by SecureXL and partially by the Firewall kernel1. References: Check Point R81 Performance Tuning Administration Guide

Which components allow you to reset a VPN tunnel?


A. vpn tu command or SmartView monitor


B. delete vpn ike sa or vpn she11 command


C. vpn tunnelutil or delete vpn ike sa command


D. SmartView monitor only





A.
  vpn tu command or SmartView monitor

UserCheck objects in the Application Control and URL Filtering rules allow the gateway to communicate with the users. Which action is not supported in UserCheck objects?


A. Ask


B. Drop


C. Inform


D. Reject





D.
  Reject

Which one of the following is true about Capsule Connect?


A. It is a full layer 3 VPN client


B. It offers full enterprise mobility management


C. It is supported only on iOS phones and Windows PCs


D. It does not support all VPN authentication methods





A.
  It is a full layer 3 VPN client

Explanation: Capsule Connect is a full layer 3 VPN client that provides secure and seamless remote access to corporate networks from iOS and Android devices. It supports all VPN authentication methods, such as certificates, passwords, tokens, and challenge-response. It also supports split tunneling and seamless roaming. References: Capsule Connect Datasheet, Capsule Connect Administration Guide

By default, the R81 web API uses which content-type in its response?


A. Java Script


B. XML


C. Text


D. JSON





D.
  JSON

Explanation: By default, the R81 web API uses JSON as the content-type in its response. JSON stands for JavaScript Object Notation and is a lightweight data-interchange format that is easy to read and write. XML, Java Script, and Text are not the default content-types for the R81 web API. References: : Check Point Software, Getting Started, Web API; : JSON.org, Introducing JSON.

What kind of information would you expect to see when using the "sim affinity -I" command?


A. Overview over SecureXL templated connections


B. The VMACs used in a Security Gateway cluster


C. Affinity Distribution


D. The involved firewall kernel modules in inbound and outbound packet chain





C.
  Affinity Distribution

Explanation: The “sim affinity -I” command is a command that displays the affinity distribution of the Security Gateway’s interfaces. Affinity distribution is the assignment of CPU cores to handle the traffic from different interfaces. The “sim affinity -I” command shows the following information for each interface:

The interface name, such as eth0, eth1, etc.
The interface index, such as 0, 1, 2, etc.
The interface type, such as physical, bond, VLAN, etc.
The interface state, such as up or down
The interface speed, such as 1000 Mbps, 10000 Mbps, etc.
The interface MTU, such as 1500, 9000, etc.
The interface MAC address, such as 00:11:22:33:44:55
The interface IP address, such as 192.168.1.1, 10.0.0.1, etc.
The interface affinity mask, such as 0x00000001, 0x00000002, etc. The affinity mask is a hexadecimal value that represents the CPU cores that are assigned to handle the traffic from the interface. For example, 0x00000001 means that only CPU core 0 is assigned, 0x00000003 means that CPU cores 0 and 1 are assigned, and so on.
The “sim affinity -I” command can help you to monitor and optimize the performance of your Security Gateway by showing you how the traffic load is distributed among the CPU cores. You can also use the “sim affinity” command with other options to change the affinity settings of the interfaces or the firewall instances. For more information, you can refer to the Check Point R81.20 (Titan) Resolved Issues and Enhancements1 or the Solved: Sim Affinity - Check Point CheckMates2.

SmartConsole R81 requires the following ports to be open for SmartEvent R81 management:


A. 19090,22


B. 19190,22


C. 18190,80


D. 19009,443





D.
  19009,443

How often does Threat Emulation download packages by default?


A. Once a week


B. Once an hour


C. Twice per day


D. Once per day





D.
  Once per day

Explanation: Threat Emulation downloads packages by default once per day. The packages contain updates for the Threat Emulation engine, signatures, and images. The download frequency can be changed in the Threat Prevention policy settings. References: Threat Emulation Administration Guide, Threat Prevention R81 Release Notes


Page 11 out of 43 Pages
Previous