Free 156-315.81 Exam Braindumps (page: 55)

Page 54 of 158

What CLI command compiles and installs a Security Policy on the target's Security Gateways?

  1. fwm compile
  2. fwm load
  3. fwm fetch
  4. fwm install

Answer(s): B

Explanation:

The CLI command that compiles and installs a Security Policy on the target's Security Gateways is fwm load. Fwm stands for FireWall Management, and it is a command that allows administrators to perform various management tasks on the Security Management Server or Multi-Domain Server. Fwm load takes two arguments: the name of the Security Policy and the name or IP address of the target Security Gateway or Gateway Cluster. For example:
[Expert@SMS]# fwm load Standard_Policy fw1
This command will compile and install the Standard_Policy on the Security Gateway named fw1. The other commands are either invalid or perform different functions.



Pamela is Cyber Security Engineer working for Global Instance Firm with large scale deployment of Check Point Enterprise Appliances using GAiA/R81.20. Company's Developer Team is having random access issue to newly deployed Application Server in DMZ's Application Server Farm Tier and blames DMZ Security Gateway as root cause. The ticket has been created and issue is at Pamela's desk for an investigation. Pamela decides to use Check Point's Packet Analyzer Tool-fw monitor to iron out the issue during approved Maintenance window.

What do you recommend as the best suggestion for Pamela to make sure she successfully captures entire traffic in context of Firewall and problematic traffic?

  1. Pamela should check SecureXL status on DMZ Security gateway and if it's turned ON. She should turn OFF SecureXL before using fw monitor to avoid misleading traffic captures.
  2. Pamela should check SecureXL status on DMZ Security Gateway and if it's turned OFF. She should turn ON SecureXL before using fw monitor to avoid misleading traffic captures.
  3. Pamela should use tcpdump over fw monitor tool as tcpdump works at OS-level and captures entire traffic.
  4. Pamela should use snoop over fw monitor tool as snoop works at NIC driver level and captures entire traffic.

Answer(s): A

Explanation:

The best suggestion for Pamela to make sure she successfully captures entire traffic in context of Firewall and problematic traffic is: Pamela should check SecureXL status on DMZ Security gateway and if it's turned ON. She should turn OFF SecureXL before using fw monitor to avoid misleading traffic captures. SecureXL is a technology that accelerates network traffic processing by offloading intensive operations from the Firewall kernel to a dedicated SecureXL device. However, this also means that some traffic might not be seen by fw monitor, which is a tool that captures packets at different inspection points in the Firewall kernel. Therefore, to ensure that fw monitor captures all traffic, SecureXL should be turned OFF before using fw monitor. The other suggestions are either incorrect or less effective in capturing traffic.



Fill in the blank: The "fw monitor" tool can be best used to troubleshoot ____________________.

  1. AV issues
  2. VPN errors
  3. Network traffic issues
  4. Authentication issues

Answer(s): C

Explanation:

The "fw monitor" tool can be best used to troubleshoot network traffic issues. Fw monitor is a tool that allows administrators to capture packets at different inspection points in the Firewall kernel, and apply filters and flags to analyze the traffic. Fw monitor can help troubleshoot network connectivity problems, packet drops, NAT issues, VPN issues, and more. The other options are either not related or less suitable for fw monitor.



In which formats can Threat Emulation forensics reports be viewed in?

  1. TXT, XML and CSV
  2. PDF and TXT
  3. PDF, HTML, and XML
  4. PDF and HTML

Answer(s): C

Explanation:

The formats in which Threat Emulation forensics reports can be viewed in are PDF, HTML, and XML.

Threat Emulation is a feature that detects and prevents zero-day attacks by emulating files in a sandbox environment and analyzing their behavior. Threat Emulation generates forensics reports that provide detailed information about the emulated files, such as verdict, severity, activity summary, screenshots, network activity, registry activity, file activity, and process activity. These reports can be viewed in PDF, HTML, or XML formats from SmartConsole or SmartView.






Post your Comments and Discuss Checkpoint 156-315.81 exam with other Community members:

156-315.81 Exam Discussions & Posts