Go Back on 156-315.81 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

156-315.81 Practice Test


Page 13 out of 85 Pages

To ensure that VMAC mode is enabled, which CLI command should you run on all cluster members?


A. fw ctl set int fwha vmac global param enabled


B. fw ctl get int vmac global param enabled; result of command should return value 1


C. cphaprob-a if


D. fw ctl get int fwha_vmac_global_param_enabled; result of command should return value 1





D.
  fw ctl get int fwha_vmac_global_param_enabled; result of command should return value 1

Explanation: To ensure that VMAC mode is enabled, the CLI command that should be run on all cluster members is fw ctl get int fwha_vmac_global_param_enabled; result of command should return value 1. VMAC mode is a feature that allows ClusterXL to use virtual MAC addresses for cluster interfaces, instead of physical MAC addresses. This improves the failover performance and compatibility of ClusterXL with switches and routers. To check if VMAC mode is enabled, the command fw ctl get int fwha_vmac_global_param_enabled can be used, which returns 1 if VMAC mode is enabled, and 0 if VMAC mode is disabled.

What are the methods of SandBlast Threat Emulation deployment?


A. Cloud, Appliance and Private


B. Cloud, Appliance and Hybrid


C. Cloud, Smart-1 and Hybrid


D. Cloud, OpenServer and Vmware





A.
  Cloud, Appliance and Private

Explanation: The methods of SandBlast Threat Emulation deployment are Cloud, Appliance, and Private. SandBlast Threat Emulation is a solution that detects and prevents zero-day attacks by emulating files in a sandbox environment and analyzing their behavior for malicious indicators. SandBlast Threat Emulation can be deployed in three different methods: Cloud, Appliance, and Private. Cloud method is when the files are sent to the Check Point cloud service for emulation and analysis. This method does not require any additional hardware or software on the customer’s side, and provides the fastest updates and feeds from ThreatCloud. Appliance method is when the files are sent to a dedicated appliance on the customer’s network for emulation and analysis. This method provides more control and privacy for the customer, and supports more file types and sizes. Private method is when the files are sent to a private cloud service on the customer’s network for emulation and analysis. This method provides the highest level of control and privacy for the customer, and supports customizing the emulation environment and scenarios.

In what way is Secure Network Distributor (SND) a relevant feature of the Security Gateway?


A. SND is a feature to accelerate multiple SSL VPN connections


B. SND is an alternative to IPSec Main Mode, using only 3 packets


C. SND is used to distribute packets among Firewall instances


D. SND is a feature of fw monitor to capture accelerated packets





C.
  SND is used to distribute packets among Firewall instances

Explanation: Secure Network Distributor (SND) is a relevant feature of the Security Gateway because it is used to distribute packets among Firewall instances. SND is a technology that improves the performance and scalability of the Security Gateway by using multiple cores to handle concurrent connections. SND consists of two components: SND driver and Firewall instances. SND driver is responsible for receiving packets from network interfaces and distributing them to Firewall instances based on a load balancing algorithm. Firewall instances are responsible for inspecting packets according to security policies and forwarding them to their destinations. The other options are either incorrect or not related to SND.

What two ordered layers make up the Access Control Policy Layer?


A. URL Filtering and Network


B. Network and Threat Prevention


C. Application Control and URL Filtering


D. Network and Application Control





D.
  Network and Application Control

Explanation: What two ordered layers make up the Access Control Policy Layer? Network and Application Control are the two ordered layers that make up the Access Control Policy Layer. The Network layer controls network access based on source, destination, service, time, etc. The Application Control layer controls application access based on users, groups, applications, content categories, etc. The Network layer is always processed before the Application Control layer. References: R81 Security Management Administration Guide, page 29.

What is the amount of Priority Queues by default?


A. There are 8 priority queues and this number cannot be changed.


B. There is no distinct number of queues since it will be changed in a regular basis based on its system requirements.


C. There are 7 priority queues by default and this number cannot be changed.


D. There are 8 priority queues by default, and up to 8 additional queues can be manually configured





D.
  There are 8 priority queues by default, and up to 8 additional queues can be manually configured

Explanation: There are 8 priority queues by default, and up to 8 additional queues can be manually configured1. Priority Queues are a feature of SecureXL that accelerates the performance of the Security Gateway by offloading CPU-intensive operations to the SecureXL device2. Priority Queues are used to prioritize traffic when the Security Gateway is stressed and needs to drop packets2. By default, there are 8 priority queues, each with a different priority level and type of connections2. You can manually configure up to 8 additional queues by setting the relevant kernel parameters in $FWDIR/boot/modules/fwkern.conf file1. You can also customize the queue length, the load balancing method, and the services that are considered as control connections1.
References: Firewall Priority Queues in R80.x / R81.x - Check Point Software, SecureXL - Check Point Software


Page 13 out of 85 Pages
Previous