Free 156-215.81 Exam Braindumps (page: 15)

Page 15 of 102

Fill in the blank: In Security Gateways R75 and above, SIC uses ______________ for encryption.

  1. AES-128
  2. AES-256
  3. DES
  4. 3DES

Answer(s): A

Explanation:

In Security Gateways R75 and above, SIC uses AES-128 for encryption. SIC stands for Secure Internal Communication, which is a mechanism that establishes trust between Check Point components, such as Security Gateways, Security Management Servers, Log Servers, etc. SIC uses certificates to authenticate and encrypt the communication between the components. AES-128 is an encryption algorithm that uses a 128-bit key to encrypt and decrypt data. The other options are incorrect. AES- 256 is an encryption algorithm that uses a 256-bit key, but it is not used by SIC. DES and 3DES are older encryption algorithms that use 56-bit and 168-bit keys respectively, but they are not used by SIC either.


Reference:

[Secure Internal Communication (SIC) between Check Point components], AES
- Wikipedia, DES - Wikipedia, Triple DES - Wikipedia



What protocol is specifically used for clustered environments?

  1. Clustered Protocol
  2. Synchronized Cluster Protocol
  3. Control Cluster Protocol
  4. Cluster Control Protocol

Answer(s): D

Explanation:

The protocol that is specifically used for clustered environments is Cluster Control Protocol (CCP). CCP is a proprietary Check Point protocol that is used for communication between cluster members and for cluster administration. CCP enables cluster members to exchange state information, synchronize connections, monitor interfaces, and perform failover operations. The other options are incorrect. Clustered Protocol, Synchronized Cluster Protocol, and Control Cluster Protocol are not valid terms in Check Point terminology.


Reference:

[Cluster Control Protocol (CCP) - Check Point Software]



Which of the following is NOT a tracking option? (Select three)

  1. Partial log
  2. Log
  3. Network log
  4. Full log

Answer(s): A,C,D

Explanation:

The options that are not tracking options are Partial log, Network log, and Full log. Tracking options are settings that determine how the Security Gateway handles traffic that matches a rule in the security policy. The valid tracking options are Log, Detailed Log, Extended Log, Alert, Mail, SNMP trap, User Defined Alert, and None. The other options are incorrect. Log is a tracking option that records basic information about the traffic, such as source, destination, service, action, etc. Detailed Log is a tracking option that records additional information about the traffic, such as NAT details, data amount, etc. Extended Log is a tracking option that records even more information about the traffic, such as matched IPS protections, application details, etc.


Reference:

[Logging and Monitoring Administration Guide R80 - Check Point Software]



Which command shows the installed licenses?

  1. cplic print
  2. print cplic
  3. fwlic print
  4. show licenses

Answer(s): A

Explanation:

The command that shows the installed licenses is cplic print. This command displays the license information on a Check Point server or Security Gateway. It shows the license type, expiration date, attached blades, etc. The other options are incorrect. print cplic is not a valid command. fwlic print is not a valid command. show licenses is not a valid command.


Reference:

[How to check license status on SecurePlatform / Gaia from CLI]



Page 15 of 102



Post your Comments and Discuss Checkpoint 156-215.81 exam with other Community members:

Pooja commented on September 08, 2024
Nice info ok I will do the same
Anonymous
upvote

IPR commented on October 05, 2023
q:124 is wrong - the correct answer is b but the syntax is: ip-address
Anonymous
upvote

IPR commented on October 05, 2023
Q:124 is wrong - the correct answer is B but the syntax is: ip-address
Anonymous
upvote