Free 156-315.81 Exam Braindumps (page: 36)

Page 35 of 158

Under which file is the proxy arp configuration stored?

  1. $FWDIR/state/proxy_arp.conf on the management server
  2. $FWDIR/conf/local.arp on the management server
  3. $FWDIR/state/_tmp/proxy.arp on the security gateway
  4. $FWDIR/conf/local.arp on the gateway

Answer(s): D

Explanation:

The proxy ARP configuration is stored under the following file:
D. $FWDIR/conf/local.arp on the gateway

This file, local.arp, contains the proxy ARP configuration for the Security Gateway. It is used to configure ARP (Address Resolution Protocol) settings for network communication.


Reference:

Check Point Certified Security Expert R81 Study Guide, Check Point documentation on proxy ARP.



What information is NOT collected from a Security Gateway in a Cpinfo?

  1. Firewall logs
  2. Configuration and database files
  3. System message logs
  4. OS and network statistics

Answer(s): A

Explanation:

In a Cpinfo (Checkpoint information) command, various information is collected from a Security Gateway. However, firewall logs are NOT collected from a Security Gateway in a Cpinfo.

A) Firewall logs

The Cpinfo command typically collects information such as configuration and database files, system message logs, OS and network statistics, but it does not include firewall logs. Firewall logs are usually obtained separately using other methods or tools.


Reference:

Check Point Certified Security Expert R81 Study Guide, Check Point documentation on Cpinfo.



SandBlast appliances can be deployed in the following modes:

  1. using a SPAN port to receive a copy of the traffic only
  2. detect only
  3. inline/prevent or detect
  4. as a Mail Transfer Agent and as part of the traffic flow only

Answer(s): C

Explanation:

SandBlast appliances can be deployed in the following modes:

C) Inline/prevent or detect

SandBlast appliances can be deployed in an inline mode where they actively inspect and prevent or detect malicious traffic. In this mode, the appliance sits in the network traffic path and can take actions to block or detect threats in real-time.


Reference:

Check Point Certified Security Expert R81 Study Guide, Check Point documentation on SandBlast.



Traffic from source 192.168.1.1 is going to www.google.com. The Application Control Blade on the gateway is inspecting the traffic. Assuming acceleration is enabled which path is handling the traffic?

  1. Slow Path
  2. Medium Path
  3. Fast Path
  4. Accelerated Path

Answer(s): A

Explanation:

When traffic from source 192.168.1.1 is going to www.google.com, and the Application Control Blade on the gateway is inspecting the traffic with acceleration enabled, it is handled by the Slow Path.

A) Slow Path

The Slow Path is responsible for handling traffic that requires full inspection by various security blades, including the Application Control Blade. Acceleration may offload some processing to the Medium Path or Fast Path, but the Slow Path is still involved in deeper inspection.


Reference:

Check Point Certified Security Expert R81 Study Guide, Check Point documentation on traffic acceleration and processing paths.






Post your Comments and Discuss Checkpoint 156-315.81 exam with other Community members:

156-315.81 Exam Discussions & Posts