156-315.81 Practice Test Questions

422 Questions


During the Check Point Stateful Inspection Process, for packets that do not pass Firewall Kernel Inspection and are rejected by the rule definition, packets are:


A. Dropped without sending a negative acknowledgment


B. Dropped without logs and without sending a negative acknowledgment


C. Dropped with negative acknowledgment


D. Dropped with logs and without sending a negative acknowledgment





CoreXL is supported when one of the following features is enabled:


A. Route-based VPN


B. IPS


C. IPv6


D. Overlapping NAT





Which TCP-port does CPM process listen to?


A. 18191


B. 18190


C. 8983


D. 19009





Which of the following Check Point processes within the Security Management Server is responsible for the receiving of log records from Security Gateway?


A. logd


B. fwd


C. fwm


D. cpd





Fill in the blank: The R81 utility fw monitor is used to troubleshoot ______________________.


A. User data base corruption


B. LDAP conflicts


C. Traffic issues


D. Phase two key negotiations





The fwd process on the Security Gateway sends logs to the fwd process on the Management Server via which 2 processes?


A. fwd via cpm


B. fwm via fwd


C. cpm via cpd


D. fwd via cpd





Which method below is NOT one of the ways to communicate using the Management API’s?


A. Typing API commands using the “mgmt_cli” command


B. Typing API commands from a dialog box inside the SmartConsole GUI application


C. Typing API commands using Gaia’s secure shell(clish)19+


D. Sending API commands over an http connection using web-services





Which file contains the host address to be published, the MAC address that needs to be associated with the IP Address, and the unique IP of the interface that responds to ARP request?


A. /opt/CPshrd-R81/conf/local.arp


B. /var/opt/CPshrd-R81/conf/local.arp


C. $CPDIR/conf/local.arp


D. $FWDIR/conf/local.arp





How many images are included with Check Point TE appliance in Recommended Mode?


A. 2(OS) images


B. images are chosen by administrator during installation


C. as many as licensed for


D. the newest image





What are the three components for Check Point Capsule?


A. Capsule Docs, Capsule Cloud, Capsule Connect


B. Capsule Workspace, Capsule Cloud, Capsule Connect


C. Capsule Workspace, Capsule Docs, Capsule Connect


D. Capsule Workspace, Capsule Docs, Capsule Cloud





To fully enable Dynamic Dispatcher on a Security Gateway:


A. run fw ctl multik set_mode 9 in Expert mode and then Reboot.


B. Using cpconfig, update the Dynamic Dispatcher value to “full” under the CoreXL menu.


C. Edit/proc/interrupts to include multik set_mode 1 at the bottom of the file, save, and reboot.


D. run fw multik set_mode 1 in Expert mode and then reboot.





Check Point recommends configuring Disk Space Management parameters to delete old log entries when available disk space is less than or equal to?


A. 50%


B. 75%


C. 80%


D. 15%






Page 4 out of 36 Pages
Previous