What is required for a site-to-site VPN tunnel that does not use certificates?
A. Pre-Shared Secret
B. RSA Token
C. Unique Passwords
D. SecurelD
Correct Answer: A
A pre-shared secret is a secret key that is shared between the two VPN peers before establishing a secure connection. It is used to authenticate the VPN peers and encrypt the VPN traffic. A pre-shared secret is required for a site-to-site VPN tunnel that does not use certificates, because certificates are another way of authenticating the VPN peers using public key cryptography. Without certificates, the VPN peers need to have a common secret key that only they know. References: Check Point R81 VPN Administration Guide, page 13
Question 352:
There are multiple types of licenses for the various VPN components and types. License type related to management and functioning of Remote Access VPNs are - which of the following license requirement statement is NOT true:
A. MobileAccessLicense ?This license is required on the Security Gateway for the following Remote Access solutions
B. EndpointPolicyManagementLicense ?The Endpoint Security Suite includes blades other than the Remote Access VPN, hence this license is required to manage the suite
C. EndpointContainerLicense ?The Endpoint Software Blade Licenses does not require an Endpoint Container License as the base
D. IPSecVPNLicense ?This license is installed on the VPN Gateway and is a basic requirement for a Remote Access VPN solution
Correct Answer: C
The Endpoint Policy Management License is required for managing the Endpoint Security Suite, which includes blades such as the Remote Access VPN. The IPSec VPN License is installed on the VPN Gateway and is a basic requirement for a Remote Access VPN solution. The MobileAccessLicense is required on the Security Gateway for the following Remote Access solutions.
Question 353:
You pushed a policy to your gateway and you cannot access the gateway remotely any more. What command should you use to remove the policy from the gateway by logging in through console access?
A. "fw cpstop"
B. "fw unloadlocal"
C. "fwundo"
D. "fw unloadpolicy''
Correct Answer: B
The command that should be used to remove the policy from the gateway by logging in through console access is "fw unloadlocal". This command will unload all security policies from a gateway or cluster member and allow all traffic to pass through it. This command can be useful for troubleshooting purposes or for emergency access to a gateway. References: [Check Point R81 CLI Reference Guide]
Question 354:
Packet acceleration (SecureXL) identifies connections by several attributes. Which of the attributes is NOT used for identifying connection?
A. Source Address
B. Destination Address
C. TCP Acknowledgment Number
D. Source Port
Correct Answer: C
The attribute that is not used for identifying a connection by packet acceleration (SecureXL) is TCP Acknowledgment Number. SecureXL identifies connections by using a hash function that takes into account the following attributes: source address, destination address, source port, destination port, protocol, and VPN ID. The TCP Acknowledgment Number is not part of the hash function and does not affect the connection identification. References: [SecureXL Mechanism] https //sc1.checkpoint.com/documents/R77/CP R77_Firewall_WebAdmm/92711.htm
Question 355:
Which of the completed statements is NOT true? The WebUI can be used to manage user accounts and:
A. assign privileges to users.
B. edit the home directory of the user.
C. add users to your Gaia system.
D. assign user rights to their home directory in the Security Management Server.
Correct Answer: D
The WebUI can be used to manage user accounts and assign privileges to users. It can also add users to your Gaia system and edit the home directory of the user. However, it cannot assign user rights to their home directory in the Security Management Server1. References: Check Point Resource Library, page 3.
Question 356:
The fwd process on the Security Gateway sends logs to the fwd process on the Management Server, where it is forwarded to___________via____________
A. cpd, fwm
B. cpm, cpd
C. fwm, cpd
D. cpwd, fwssd
Correct Answer: C
The fwd process on the Security Gateway sends logs to the fwd process on the Management Server, where it is forwarded to fwm via cpd. The fwm process is responsible for managing the log files and the cpd process is responsible for communication between processes. The other options are incorrect because they involve processes that are not related to logging or communication. References: Check Point Certified Security Expert R81.20 Course Overview, sk163413: Support, Support Requests, Training ... - Check Point Software, Check Point Certified Security Expert R81.20
Question 357:
Which of the following Check Point commands is true to enable Multi-Version Cluster (MVC)?
A. Check Point Security Management HA (Secondary): set cluster member mvc on
B. Check Point Security Gateway Only: set cluster member mvc on
C. Check Point Security Management HA (Primary): set cluster member mvc on
D. Check Point Security Gateway Cluster Member: set cluster member mvc on
Correct Answer: D
You can enable Multi-Version Cluster (MVC) by running set cluster member mvc on on the Check Point Security Gateway Cluster Member1. MVC is a feature that allows you to upgrade a Security Gateway Cluster to a higher version without
downtime2. It works by upgrading one cluster member at a time, while the other cluster members continue to operate with the lower version2. MVC supports upgrading from R80.40 and above to R81 and above2. To use MVC, you need to do
the following steps2:
Enable MVC on each cluster member by running set cluster member mvc on in Clish and rebooting the gateway.
Install the higher version on one cluster member using CPUSE or ISO image. Install policy on the upgraded cluster member and verify that it works properly. Repeat the previous steps for the remaining cluster members until all of them are
upgraded.
Disable MVC on each cluster member by running set cluster member mvc off in Clish and rebooting the gateway.
References: Multi-Version Cluster (MVC) - Check Point Software, Multi-Version Cluster (MVC) - Check Point CheckMates
Question 358:
What is the command used to activated Multi-Version Cluster mode?
A. set cluster member mvc on in Clish
B. set mvc on on Clish
C. set cluster MVC on in Expert Mode
D. set cluster mvc on in Expert Mode
Correct Answer: A
The command used to activate Multi-Version Cluster mode is set cluster member mvc on in Clish. Multi-Version Cluster mode is a feature that allows cluster members to run different versions of Check Point software during a cluster upgrade. This reduces downtime and simplifies the upgrade process. To enable Multi-Version Cluster mode, the command set cluster member mvc on must be executed on each cluster member in Clish3. The other options are not valid commands for activating Multi-Version Cluster mode. References: 3: Check Point Software, Getting Started, Multi-Version Cluster.
Question 359:
What is the recommended way to have a redundant Sync connection between the cluster nodes?
A. In the SmartConsole / Gateways and Servers -> select Cluster Properties / Network Management and define two Sync interfaces per node. Connect both Sync interfaces without using a switch.
B. Use a group of bonded interfaces. In the SmartConsole / Gateways and Servers -> select Cluster Properties / Network Management and define a Virtual IP for the Sync interface.
C. In the SmartConsole / Gateways and Servers -> select Cluster Properties / Network Management and define two Sync interfaces per node. Use two different Switches to connect both Sync interfaces.
D. Use a group of bonded interfaces connected to different switches. Define a dedicated sync interface, only one interface per node using the SmartConsole / Gateways and Servers -> select Cluster Properties / Network Management.
Correct Answer: D
The recommended way to have a redundant Sync connection between the cluster nodes is to use a group of bonded interfaces connected to different switches. In the SmartConsole / Gateways and Servers -> select Cluster Properties / Network Management, you should define a dedicated sync interface, only one interface per node.
Question 360:
Bob works for a big security outsourcing provider company and as he receives a lot of change requests per day he wants to use for scripting daily tasks the API services (torn Check Point for the GAIA API. Firstly he needs to be aware if the API services are running for the GAIA operating system. Which of the following Check Point Command is true:
A. gala_dlish status
B. status gaiaapi
C. api_gala status
D. gala_api status
Correct Answer: D
https://sc1.checkpoint.com/documents/latest/GaiaAPIs/#api_access~v1.7%20 The correct Check Point command to check if the API services are running for the GAIA operating system is gala_api status. The gala_api command is used to manage the API services in the GAIA operating system, and the status option is used to check the status of the API services.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CheckPoint exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 156-315.81 exam preparations and CheckPoint certification application, do not hesitate to visit our Vcedump.com to find your solutions here.