156-315.81 Practice Test Questions

422 Questions


How do you enable virtual mac (VMAC) on-the-fly on a cluster member?


A. cphaprob set int fwha_vmac_global_param_enabled 1


B. clusterXL set int fwha_vmac_global_param_enabled 1


C. fw ctl set int fwha_vmac_global_param_enabled 1


D. cphaconf set int fwha_vmac_global_param_enabled 1





C.
  fw ctl set int fwha_vmac_global_param_enabled 1

Explanation: To enable VMAC mode on a cluster member, you need to set the value of the global kernel parameter fwha_vmac_global_param_enabled to 1. This can be done on-the-fly using the command fw ctl set int fwha_vmac_global_param_enabled 1 on all cluster members. This command does not require a reboot or a policy installation. VMAC mode allows the cluster to use a virtual MAC address for its virtual IP addresses, which reduces the number of gratuitous ARP packets sent upon failover and avoids ARP cache issues on some routers and switches. References: How to enable ClusterXL Virtual MAC (VMAC) mode

Which statement is true about ClusterXL?


A. Supports Dynamic Routing (Unicast and Multicast)


B. Supports Dynamic Routing (Unicast Only)


C. Supports Dynamic Routing (Multicast Only)


D. Does not support Dynamic Routing





A.
  Supports Dynamic Routing (Unicast and Multicast)

Which one of the following is true about Threat Emulation?


A. Takes less than a second to complete


B. Works on MS Office and PDF files only


C. Always delivers a file


D. Takes minutes to complete (less than 3 minutes)





D.
  Takes minutes to complete (less than 3 minutes)

What is the purpose of Priority Delta in VRRP?


A. When a box up, Effective Priority = Priority + Priority Delta


B. When an Interface is up, Effective Priority = Priority + Priority Delta


C. When an Interface fail, Effective Priority = Priority – Priority Delta


D. When a box fail, Effective Priority = Priority – Priority Delta





C.
  When an Interface fail, Effective Priority = Priority – Priority Delta

Which of the following is NOT a type of Check Point API available in R81.x?


A. Identity Awareness Web Services


B. OPSEC SDK


C. Mobile Access


D. Management





C.
  Mobile Access

After making modifications to the $CVPNDIR/conf/cvpnd.C file, how would you restart the daemon?


A. cvpnd_restart


B. cvpnd_restart


C. cvpnd restart


D. cvpnrestart





B.
  cvpnd_restart

Which one of the following is true about Threat Extraction?


A. Always delivers a file to user


B. Works on all MS Office, Executables, and PDF files


C. Can take up to 3 minutes to complete


D. Delivers file only if no threats found





A.
  Always delivers a file to user

Explanation: Threat Extraction is a software blade that always delivers a file to user. Threat Extraction removes or sanitizes the active content from the files and converts them to PDF format, which is safer and more compatible. Threat Extraction can also work together with Threat Emulation to provide both clean and original files to the users. Threat Extraction works on MS Office, PDF, and archive files, but not on executables. Threat Extraction can take up to 3 minutes to complete, depending on the file size and complexity. References: Check Point Security Expert R81 Course, Threat Extraction Administration Guide

To enable Dynamic Dispatch on Security Gateway without the Firewall Priority Queues, run the following command in Expert mode and reboot:


A. fw ctl Dyn_Dispatch on


B. fw ctl Dyn_Dispatch enable


C. fw ctl multik set_mode 4


D. fw ctl multik set_mode 1





C.
  fw ctl multik set_mode 4

Explanation: Dynamic Dispatch is a feature that enhances CoreXL performance by dynamically assigning new connections to CoreXL FW instances based on their CPU utilization1. To enable Dynamic Dispatch on Security Gateway without enabling Firewall Priority Queues (FPQ), you need to run the command fw ctl multik set_mode 4 in Expert mode and reboot2. This command will set the CoreXL mode to Dynamic Dispatcher without FPQ. The other options are not correct because:
A. fw ctl Dyn_Dispatch on: This command does not exist and will return an error message.
B. fw ctl Dyn_Dispatch enable: This command does not exist and will return an error message.
D. fw ctl multik set_mode 1: This command will set the CoreXL mode to Static Dispatcher without FPQ, which is the default mode2. This mode will use a static hash function to assign new connections to CoreXL FW instances based on their IP addresses and protocol.
References: CoreXL Dynamic Dispatcher, To fully enable Dynamic Dispatcher on a Security Gateway, Running Dynamic Dispatch / Dynamic Split / Dynamic Balancing on VSEC/IaaS in Vmware, Dynamic Balancing for CoreXL

nefit of “tw monitor” over “tcpdump


A. “fw monitor” reveals Layer 2 information, while “tcpdump” acts at Layer 3.


B. fw monitor” is also available for 64-Bit operating systems.


C. With “fw monitor”, you can see the inspection points, which cannot be seen in “tcpdump”


D. “fw monitor” can be used from the CLI of the Management Server to collect information from multiple gateways.





C.
  With “fw monitor”, you can see the inspection points, which cannot be seen in “tcpdump”

Explanation: The benefit of fw monitor over tcpdump is that with fw monitor, you can see the inspection points, which cannot be seen in tcpdump. Inspection points are the locations in the firewall kernel where packets are inspected by the security policy and other software blades. Fw monitor allows you to capture packets at different inspection points and see how they are processed by the firewall. Tcpdump, on the other hand, is a generic packet capture tool that only shows the packets as they enter or leave the network interface. References: Check Point Security Expert R81 Course, fw monitor, tcpdump

To accelerate the rate of connection establishment, SecureXL groups all connection that match a particular service and whose sole differentiating element is the source port. The type of grouping enables even the very first packets of a TCP handshake to be accelerated. The first packets of the first connection on the same service will be forwarded to the Firewall kernel which will then create a template of the connection. Which of the these is NOT a SecureXL template?


A. Accept Template


B. Deny Template


C. Drop Template


D. NAT Template





B.
  Deny Template

SandBlast appliances can be deployed in the following modes:


A. using a SPAN port to receive a copy of the traffic only


B. detect only


C. inline/prevent or detect


D. as a Mail Transfer Agent and as part of the traffic flow only





C.
  inline/prevent or detect

VPN Link Selection will perform the following when the primary VPN link goes down?


A. The Firewall will drop the packets.


B. The Firewall can update the Link Selection entries to start using a different link for the same tunnel.


C. The Firewall will send out the packet on all interfaces.


D. The Firewall will inform the client that the tunnel is down.





B.
  The Firewall can update the Link Selection entries to start using a different link for the same tunnel.


Page 12 out of 36 Pages
Previous