156-315.81 Exam Questions

Total 422 Questions

Last Updated Exam : 30-Dec-2024

Which of the following describes how Threat Extraction functions?


A. Detect threats and provides a detailed report of discovered threats.


B. Proactively detects threats.


C. Delivers file with original content.


D. Delivers PDF versions of original files with active content removed.





D.
  Delivers PDF versions of original files with active content removed.

Explanation: Threat Extraction is a software blade that delivers PDF versions of original files with active content removed. Active content, such as macros, scripts, or embedded objects, can be used by attackers to deliver malware or exploit vulnerabilities. Threat Extraction removes or sanitizes the active content from the files and converts them to PDF format, which is safer and more compatible. Threat Extraction can also work together with Threat Emulation to provide both clean and original files to the users. References: Check Point Security Expert R81 Course, Threat Extraction Administration Guide

SandBlast has several functional components that work together to ensure that attacks are prevented in real-time. Which the following is NOT part of the SandBlast component?


A. Threat Emulation


B. Mobile Access


C. Mail Transfer Agent


D. Threat Cloud





B.
  Mobile Access

How do you enable virtual mac (VMAC) on-the-fly on a cluster member?


A. cphaprob set int fwha_vmac_global_param_enabled 1


B. clusterXL set int fwha_vmac_global_param_enabled 1


C. fw ctl set int fwha_vmac_global_param_enabled 1


D. cphaconf set int fwha_vmac_global_param_enabled 1





C.
  fw ctl set int fwha_vmac_global_param_enabled 1

Explanation: To enable VMAC mode on a cluster member, you need to set the value of the global kernel parameter fwha_vmac_global_param_enabled to 1. This can be done on-the-fly using the command fw ctl set int fwha_vmac_global_param_enabled 1 on all cluster members. This command does not require a reboot or a policy installation. VMAC mode allows the cluster to use a virtual MAC address for its virtual IP addresses, which reduces the number of gratuitous ARP packets sent upon failover and avoids ARP cache issues on some routers and switches. References: How to enable ClusterXL Virtual MAC (VMAC) mode

Which statement is true about ClusterXL?


A. Supports Dynamic Routing (Unicast and Multicast)


B. Supports Dynamic Routing (Unicast Only)


C. Supports Dynamic Routing (Multicast Only)


D. Does not support Dynamic Routing





A.
  Supports Dynamic Routing (Unicast and Multicast)

Which one of the following is true about Threat Emulation?


A. Takes less than a second to complete


B. Works on MS Office and PDF files only


C. Always delivers a file


D. Takes minutes to complete (less than 3 minutes)





D.
  Takes minutes to complete (less than 3 minutes)

What is the purpose of Priority Delta in VRRP?


A. When a box up, Effective Priority = Priority + Priority Delta


B. When an Interface is up, Effective Priority = Priority + Priority Delta


C. When an Interface fail, Effective Priority = Priority – Priority Delta


D. When a box fail, Effective Priority = Priority – Priority Delta





C.
  When an Interface fail, Effective Priority = Priority – Priority Delta

Which of the following is NOT a type of Check Point API available in R81.x?


A. Identity Awareness Web Services


B. OPSEC SDK


C. Mobile Access


D. Management





C.
  Mobile Access

After making modifications to the $CVPNDIR/conf/cvpnd.C file, how would you restart the daemon?


A. cvpnd_restart


B. cvpnd_restart


C. cvpnd restart


D. cvpnrestart





B.
  cvpnd_restart

Which one of the following is true about Threat Extraction?


A. Always delivers a file to user


B. Works on all MS Office, Executables, and PDF files


C. Can take up to 3 minutes to complete


D. Delivers file only if no threats found





A.
  Always delivers a file to user

Explanation: Threat Extraction is a software blade that always delivers a file to user. Threat Extraction removes or sanitizes the active content from the files and converts them to PDF format, which is safer and more compatible. Threat Extraction can also work together with Threat Emulation to provide both clean and original files to the users. Threat Extraction works on MS Office, PDF, and archive files, but not on executables. Threat Extraction can take up to 3 minutes to complete, depending on the file size and complexity. References: Check Point Security Expert R81 Course, Threat Extraction Administration Guide

To enable Dynamic Dispatch on Security Gateway without the Firewall Priority Queues, run the following command in Expert mode and reboot:


A. fw ctl Dyn_Dispatch on


B. fw ctl Dyn_Dispatch enable


C. fw ctl multik set_mode 4


D. fw ctl multik set_mode 1





C.
  fw ctl multik set_mode 4

Explanation: Dynamic Dispatch is a feature that enhances CoreXL performance by dynamically assigning new connections to CoreXL FW instances based on their CPU utilization1. To enable Dynamic Dispatch on Security Gateway without enabling Firewall Priority Queues (FPQ), you need to run the command fw ctl multik set_mode 4 in Expert mode and reboot2. This command will set the CoreXL mode to Dynamic Dispatcher without FPQ. The other options are not correct because:
A. fw ctl Dyn_Dispatch on: This command does not exist and will return an error message.
B. fw ctl Dyn_Dispatch enable: This command does not exist and will return an error message.
D. fw ctl multik set_mode 1: This command will set the CoreXL mode to Static Dispatcher without FPQ, which is the default mode2. This mode will use a static hash function to assign new connections to CoreXL FW instances based on their IP addresses and protocol.
References: CoreXL Dynamic Dispatcher, To fully enable Dynamic Dispatcher on a Security Gateway, Running Dynamic Dispatch / Dynamic Split / Dynamic Balancing on VSEC/IaaS in Vmware, Dynamic Balancing for CoreXL


Page 14 out of 43 Pages
Previous