Go Back on 156-315.81 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

156-315.81 Practice Test


Page 7 out of 85 Pages

Fill in the blank: The “fw monitor” tool can be best used to troubleshoot ____________________.


A. AV issues


B. VPN errors


C. Network traffic issues


D. Authentication issues





C.
  Network traffic issues

Explanation: The “fw monitor” tool can be best used to troubleshoot network traffic issues. Fw monitor is a tool that allows administrators to capture packets at different inspection points in the Firewall kernel, and apply filters and flags to analyze the traffic. Fw monitor can help troubleshoot network connectivity problems, packet drops, NAT issues, VPN issues, and more. The other options are either not related or less suitable for fw monitor

What is the SandBlast Agent designed to do?


A. Performs OS-level sandboxing for SandBlast Cloud architecture


B. Ensure the Check Point SandBlast services is running on the end user’s system


C. If malware enters an end user’s system, the SandBlast Agent prevents the malware from spreading with the network


D. Clean up email sent with malicious attachments





C.
  If malware enters an end user’s system, the SandBlast Agent prevents the malware from spreading with the network

Explanation: The SandBlast Agent is designed to prevent malware from spreading within the network if it enters an end user’s system. SandBlast Agent is a lightweight endpoint security solution that protects devices from advanced threats such as ransomware, phishing, zero-day attacks, and data exfiltration. SandBlast Agent uses various technologies such as behavioral analysis, anti-exploitation, anti-ransomware, threat emulation, threat extraction, and forensics to detect and block malware before it can harm the device or the network. The other options are either not the main purpose or not the functionality of SandBlast Agent.

What kind of information would you expect to see using the sim affinity command?


A. The VMACs used in a Security Gateway cluster


B. The involved firewall kernel modules in inbound and outbound packet chain


C. Overview over SecureXL templated connections


D. Network interfaces and core distribution used for CoreXL





D.
  Network interfaces and core distribution used for CoreXL

Which statement is true regarding redundancy?


A. System Administrators know when their cluster has failed over and can also see why it failed over by using the cphaprob –f if command.


B. ClusterXL offers three different Load Sharing solutions: Unicast, Broadcast, and Multicast.


C. Machines in a ClusterXL High Availability configuration must be synchronized.


D. Both ClusterXL and VRRP are fully supported by Gaia and available to all Check Point appliances, open servers, and virtualized environments.





D.
  Both ClusterXL and VRRP are fully supported by Gaia and available to all Check Point appliances, open servers, and virtualized environments.

Explanation: The statement that is true regarding redundancy is Both ClusterXL and VRRP are fully supported by Gaia and available to all Check Point appliances, open servers, and virtualized environments. ClusterXL and VRRP are two technologies that provide high availability and load sharing for Security Gateways. They are both supported by Gaia OS and can be deployed on various platforms5. The other statements are either false or incomplete regarding redundancy.

Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.


A. Symmetric routing


B. Failovers


C. Asymmetric routing


D. Anti-Spoofing





C.
  Asymmetric routing

Explanation: Sticky Decision Function (SDF) is required to prevent asymmetric routing in an Active-Active cluster. Asymmetric routing occurs when packets from a source to a destination follow a different path than packets from the destination to the source. This can cause problems with stateful inspection and NAT. SDF ensures that packets from the same connection are handled by the same cluster member1. References: Check Point R81 ClusterXL Administration Guide


Page 7 out of 85 Pages
Previous