156-315.81 Exam Questions

Total 422 Questions

Last Updated Exam : 16-Dec-2024

To ensure that VMAC mode is enabled, which CLI command should you run on all cluster members?


A. fw ctl set int fwha vmac global param enabled


B. fw ctl get int vmac global param enabled; result of command should return value 1


C. cphaprob-a if


D. fw ctl get int fwha_vmac_global_param_enabled; result of command should return value 1





D.
  fw ctl get int fwha_vmac_global_param_enabled; result of command should return value 1

Explanation: To ensure that VMAC mode is enabled, the CLI command that should be run on all cluster members is fw ctl get int fwha_vmac_global_param_enabled; result of command should return value 1. VMAC mode is a feature that allows ClusterXL to use virtual MAC addresses for cluster interfaces, instead of physical MAC addresses. This improves the failover performance and compatibility of ClusterXL with switches and routers. To check if VMAC mode is enabled, the command fw ctl get int fwha_vmac_global_param_enabled can be used, which returns 1 if VMAC mode is enabled, and 0 if VMAC mode is disabled.

What are the methods of SandBlast Threat Emulation deployment?


A. Cloud, Appliance and Private


B. Cloud, Appliance and Hybrid


C. Cloud, Smart-1 and Hybrid


D. Cloud, OpenServer and Vmware





A.
  Cloud, Appliance and Private

Explanation: The methods of SandBlast Threat Emulation deployment are Cloud, Appliance, and Private. SandBlast Threat Emulation is a solution that detects and prevents zero-day attacks by emulating files in a sandbox environment and analyzing their behavior for malicious indicators. SandBlast Threat Emulation can be deployed in three different methods: Cloud, Appliance, and Private. Cloud method is when the files are sent to the Check Point cloud service for emulation and analysis. This method does not require any additional hardware or software on the customer’s side, and provides the fastest updates and feeds from ThreatCloud. Appliance method is when the files are sent to a dedicated appliance on the customer’s network for emulation and analysis. This method provides more control and privacy for the customer, and supports more file types and sizes. Private method is when the files are sent to a private cloud service on the customer’s network for emulation and analysis. This method provides the highest level of control and privacy for the customer, and supports customizing the emulation environment and scenarios.

In what way is Secure Network Distributor (SND) a relevant feature of the Security Gateway?


A. SND is a feature to accelerate multiple SSL VPN connections


B. SND is an alternative to IPSec Main Mode, using only 3 packets


C. SND is used to distribute packets among Firewall instances


D. SND is a feature of fw monitor to capture accelerated packets





C.
  SND is used to distribute packets among Firewall instances

Explanation: Secure Network Distributor (SND) is a relevant feature of the Security Gateway because it is used to distribute packets among Firewall instances. SND is a technology that improves the performance and scalability of the Security Gateway by using multiple cores to handle concurrent connections. SND consists of two components: SND driver and Firewall instances. SND driver is responsible for receiving packets from network interfaces and distributing them to Firewall instances based on a load balancing algorithm. Firewall instances are responsible for inspecting packets according to security policies and forwarding them to their destinations. The other options are either incorrect or not related to SND.

What two ordered layers make up the Access Control Policy Layer?


A. URL Filtering and Network


B. Network and Threat Prevention


C. Application Control and URL Filtering


D. Network and Application Control





D.
  Network and Application Control

Explanation: What two ordered layers make up the Access Control Policy Layer? Network and Application Control are the two ordered layers that make up the Access Control Policy Layer. The Network layer controls network access based on source, destination, service, time, etc. The Application Control layer controls application access based on users, groups, applications, content categories, etc. The Network layer is always processed before the Application Control layer. References: R81 Security Management Administration Guide, page 29.

What is the amount of Priority Queues by default?


A. There are 8 priority queues and this number cannot be changed.


B. There is no distinct number of queues since it will be changed in a regular basis based on its system requirements.


C. There are 7 priority queues by default and this number cannot be changed.


D. There are 8 priority queues by default, and up to 8 additional queues can be manually configured





D.
  There are 8 priority queues by default, and up to 8 additional queues can be manually configured

Explanation: There are 8 priority queues by default, and up to 8 additional queues can be manually configured1. Priority Queues are a feature of SecureXL that accelerates the performance of the Security Gateway by offloading CPU-intensive operations to the SecureXL device2. Priority Queues are used to prioritize traffic when the Security Gateway is stressed and needs to drop packets2. By default, there are 8 priority queues, each with a different priority level and type of connections2. You can manually configure up to 8 additional queues by setting the relevant kernel parameters in $FWDIR/boot/modules/fwkern.conf file1. You can also customize the queue length, the load balancing method, and the services that are considered as control connections1.
References: Firewall Priority Queues in R80.x / R81.x - Check Point Software, SecureXL - Check Point Software

Due to high CPU workload on the Security Gateway, the security administrator decided to purchase a new multicore CPU to replace the existing single core CPU. After installation, is the administrator required to perform any additional tasks?


A. After upgrading the hardware, increase the number of kernel instances using cpconfig


B. Hyperthreading must be enabled in the bios to use CoreXL


C. Run cprestart from dish


D. Administrator does not need to perform any task. Check Point will make use of the newly installed CPU and Cores.





A.
  After upgrading the hardware, increase the number of kernel instances using cpconfig

Matt wants to upgrade his old Security Management server to R81.x using the Advanced Upgrade with Database Migration. What is one of the requirements for a successful upgrade?


A. Size of the /var/log folder of the source machine must be at least 25% of the size of the /var/log directory on the target machine


B. Size of the /var/log folder of the target machine must be at least 25% of the size of the /var/log directory on the source machine


C. Size of the $FWDIR/log folder of the target machine must be at least 30% of the size of the $FWDIR/log directory on the source machine


D. Size of the /var/log folder of the target machine must be at least 25GB or more





B.
  Size of the /var/log folder of the target machine must be at least 25% of the size of the /var/log directory on the source machine

Explanation: One of the requirements for a successful upgrade using the Advanced Upgrade with Database Migration is that the size of the /var/log folder of the target machine must be at least 25% of the size of the /var/log directory on the source machine. This is to ensure that there is enough space to copy the log files from the source machine to the target machine during the upgrade process. References: Advanced Upgrade with Database Migration

After some changes in the firewall policy you run into some issues. You want to test if the policy from two weeks ago have the same issue. You don't want to lose the changes from the last weeks. What is the best way to do it?


A. Use the Gaia WebUI to take a backup of the Gateway. In SmartConsole under Security Policies go to the Installation History view of the Gateway, select the policy version from two weeks ago and press the 'Install specific version' button


B. Use the Gaia WebUI to take a snapshot of management. In the In SmartConsole under Manage & Settlings go to Sessions -> Revisions and select the revision from two weeks ago. Run the action 'Revert to this revision...' Restore the management snapshot.


C. In SmartConsole under Manage & Settings go to Sessions -> Revisions and select the revision from two weeks ago. Run the action 'Revert to this revision...'.


D. In SmartConsole under Security Policies go to the Installation History view of the Gateway, select the policy version from two weeks ago and press the 'Install specific version' button





D.
  In SmartConsole under Security Policies go to the Installation History view of the Gateway, select the policy version from two weeks ago and press the 'Install specific version' button

Explanation: The best way to test if the policy from two weeks ago have the same issue is to install the specific version of the policy from the installation history view of the gateway. This way, you can keep the changes from the last weeks in the management server and revert back to them later if needed. You do not need to take a backup or a snapshot of the gateway or the management server for this purpose.
References: [Check Point Security Expert R81 Administration Guide], page 34.

What is the command to check the status of the SmartEvent Correlation Unit?


A. fw ctl get int cpsead_stat


B. cpstat cpsead


C. fw ctl stat cpsemd


D. cp_conf get_stat cpsemd





B.
   cpstat cpsead

Explanation: The SmartEvent Correlation Unit is responsible for analyzing the log entries and identifying events from them. It runs on the Log Server machine or on a dedicated machine1. To check the status of the SmartEvent Correlation Unit, you can use the command cpstat cpsead on the machine where it is installed. This command will show you information such as the number of logs processed, the number of events generated, the CPU and memory usage, and the status of the connection to the SmartEvent Server23.
References: SmartEvent Administration Guide R76, SmartEvent Administration Guide R75, SmartEvent Performance Tuning Guide

You have used the "set inactivity-timeout 120" command to prevent the session to be disconnected after 10 minutes of inactivity. However, the Web session is being disconnected after 10 minutes. Why?


A. The idle timeout for the web session is specified with the "set web session-timeout" command.


B. The number specified is the amount of the idle timeout in seconds rather than in minutes. So you have to use the command "set inactivity-timeout 600" instead.


C. Probably, you have forgotten to make sure that nobody is accessing the management server via the SmartConsole which locks the management database.


D. The number of minutes is correct. Probably, you have forgotten to save this setting with the "save config" command.





A.
  The idle timeout for the web session is specified with the "set web session-timeout" command.

Explanation: The reason why the web session is being disconnected after 10 minutes is that the idle timeout for the web session is specified with the “set web session-timeout” command, not the “set inactivity-timeout” command. The “set inactivity-timeout” command only affects the CLI session, not the web session. To prevent the web session from being disconnected after 10 minutes of inactivity, you need to use the “set web session-timeout” command with a higher value than 10 minutes.
References: [Check Point Security Expert R81 Administration Guide], page 77.


Page 7 out of 43 Pages
Previous