Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Checkpoint 156-815 Exam - Cheat-Test.com

Free 156-815 Sample Questions:

Q: 1 To configure for CMA redundancy, which of the following would be necessary?

A. Multiple MDS Container machines
B. The CMA High Availability option selected in the CMA properties window
C. Multiple CMAs configured on a single MDS D. Multiple MDS Manager machines
E. The CMA High Availability option selected in the Customer properties window

Answer: A

Q: 2 The MDS will initiate status collection from the CMAs when which of the following occurs?

A. MDS-level High Availability is configured.
B. CMA-level High Availability is configured.
C. CMAs have established SIC with remote Security Gateways.
D. Get Node Data action is requested for a specific object displayed in the SmartUpdate View.
E. The MDG connects to the MDS Manager.

Answer: E

Q: 3 Which of the following actions occurs after the configuration of a CLM on an MDS MLM for a specific Customer?

A. The CLM object appears in the MDG. The Administrator needs to launch a SmartDashboard for that CLM, and configure it to retrieve the logs from the CMA's Gateway.
B. A default CLM object is created in the CMA Security Policy and is added to the list of log servers for each configured Security Gateway.
C. No changes appear in the CMA Security Policy, but none are required. Once the CLM of a specific Customer is created, all logs are sent to that CLM by default. This is after the Policy is installed on the Gateway and the master's file is edited by the system.
D. The system creates a default CLM object in the CMA Security Policy. The Administrator must then log in to the CMA and configure the Gateway to send all logs to the CLM, by including the CLM object in its list of log servers.
E. The system performs no default configuration tasks. The Administrator must log into the CMA, create the CLM object, and add it to the Gateway's list of log servers.

Answer: D

Q: 4 Can Global Objects be edited in the CMA SmartDashboard?

A. Yes, except objects defined as Externally Managed to the CMA specific Policy.
B. Yes, without restriction.
C. Yes, except objects with the VPN-1 Pro or VPN-1 Net options selected in the Check Point Products Installed list.
D. Yes, except objects defined as Internally Managed to the CMA specific Policy.
E. No, Global Objects cannot be edited in the CMA SmartDashboard.

Answer: E

Q: 5 What is the function of a CLM?

A. Performs system backups of the Primary and Secondary MDS machines.
B. Regulates ConnectControl traffic from the NOC to remote Gateways.
C. Serves as a backup CMA for CMA-level High Availability.
D. Protects the Provider-1 system from a network attack.
E. Collects log data for managed Security Gateways.

Answer: E

Q: 6 A Managed Service Provider (MSP) is using Provider-1 to manage their customer's security policies. What is the recommended method of securing the Provider-1 system in a NOC environment?

A. The Provider-1 software does not include an integrated firewall to protect the Provider-1 system. It is recommended to use a separate firewall to secure the Provider-1 environment, managed by the NOC Security Administrator and the Provider-1 / MSP Administrator.
B. The Provider-1 software includes an integrated firewall to protect the Provider-1 system. It is recommended to use the included firewall to secure the Provider-1 environment, managed by the NOC Security Administrator.
C. The Provider-1 software includes an integrated firewall to protect the Provider-1 system. It is recommended to use the included firewall to secure the Provider-1 environment, managed by the Provider-1 / MSP Administrator.
D. The Provider-1 software does not include an integrated firewall to protect the Provider-1 system. It is recommended to use a separate firewall to secure the Provider-1 environment, managed by the NOC Security Administrator.
E. The Provider-1 software does not include an integrated firewall to protect the Provider-1 system. It is recommended to use a separate firewall to secure the Provider-1 environment, managed by the Provider-1 / MSP Administrator.

Answer: D

Q: 7 The Eventia Reporter Add-on for Provider-1 does not have its own package.
It is installed, removed, enabled, and disabled using which of the following scripts?

A. SVRSetup
B. sysconfig
C. cpconfig
D. SetupUtil
E. EVRSetup

Answer: A

Q: 8 After the trial period expires, a permanent license must be installed. To successfully install a bundle license before the trial license expires, you must disable the trial license. Which of the following commands will disable the trial-period license on a CMA before the license expires?

A. cpprod_SetPNPDisable 1
B. SetPNPDisable lic
C. cpprod_util CPPROD_SetPnPDisable 0
D. cpprod_SetPNPDisable 0
E. cpprod_util CPPROD_SetPnPDisable 1

Answer: E

Q: 9 Secure communication from CMAs to the Security Gateways uses which type of encryption?

A. Traffic between CMAs and Security Gateways is not encrypted. Therefore, no encryption is used.
B. IKE with pre-shared secret
C. 256-bit SSL encryption
D. 128-bit SSL encryption
E. RSA encryption

Answer: D

Q: 10 All Check Point Products come with a 15-day trial-period license. How many CMAs can be managed by an MDS Manager running with only the trial license?

A. 500
B. 1
C. 200
D. 5
E. 100

Answer: C

Q: 11 Which of the following statements is TRUE concerning Provider-1?

A. The MDS Manager functions as a firewall for the Provider-1 system, protecting the MDS Containers.
B. The added security of a firewall to protect the Provider-1 system provides a greater level of security, but is not recommended, due to the complicated Security Policies that would be necessary.
C. The Provider-1 environment should be protected by its own CMA.
D. All traffic between Provider-1 modules is encrypted; no firewall is necessary to protect the Provider-1 system.
E. The Provider-1 environment should be protected by a separately managed firewall.

Answer: E

Q: 12 When installing the Primary MDS, what information must you have?

A. Type of MDS and IP address of Secondary MDS
B. Type of MDS and IP address range for virtual IP addresses
C. Type of MDS and name of leading virtual IP interface
D. Type of MDS and one-time password
E. Type of MDS and number of CMAs to be configured

Answer: C

Q: 13 How many CLMs can each MDS MLM hold?

A. 225
B. unlimited
C. 50
D. 500
E. 250

Answer: E

Q: 14 Does the Multi Domain Server (MDS) maintain multiple customer data bases, with each customer data base relating to a single CMA?

A. The Multi Domain Server (MDS) does not maintain customer databases or CMAs.
B. The Multi Domain Server (MDS) can maintain multiple customer databases with each customer database relating to multiple CMAs.
C. The Multi Domain Server (MDS) can maintain multiple customer databases managing one CMA per customer database.
D. The Multi Domain Server (MDS) can maintain a single customer database able to relate to one CMA.
E. The Multi Domain Server (MDS) maintains one customer database able to relate to multiple CMAs.

Answer: C

Q: 15 How many CMAs can each MDS manage?

A. Unlimited
B. 50
C. 500
D. 250
E. 200

Answer: C

Q: 16 When you set up Administrator permissions during the initial installation and configuration process, which of the following options is NOT available?

A. Regular Administrator (None)
B. Customer Superuser
C. Provider Superuser
D. Provider Manager
E. Customer Manager

Answer: D

Q: 17 Which service does the MDG use to connect to the MDS?

A. SAM
B. CPD
C. CPMI
D. SWTP
E. SVC

Answer: C

Q: 18 Which command, run from the MDS Manager, will stop a specific CMA?

A. mdscmd stopcustomer <CMA Name>
B. mdsstop <CMA Name>
C. mdscmd fwstop <CMA Name>
D. customer_stop <CMA Name>
E. mdsstop_customer <CMA Name>

Answer: E

Q: 19 How many Multi Domain GUIs (MDG) can connect a Multi Domain Server (MDS) at a time?

A. 250
B. 5
C. unlimited
D. 500
E. 1

Answer: C

Q: 20 When configuring an MDS MLM from the MDG, which of the following are required?

A. MDS IP address and MDS type
B. MDS Name and CMA IP address range
C. MDS Name and MDS type
D. MDS Name and MDS IP address
E. MDS IP address and CMA IP address range

Answer: D

Q: 21 Which of the following directories are required to migrate an existing VPN-1 NG Management Server into Provider-1 NGX?

A. conf, state, and CPshared conf directories
B. conf and database directories
C. conf, CPshared conf, and CPshared database directories
D. conf, bin, and lib directories
E. conf, state, and database directories

Answer: B

Q: 22 Which of the following statements is true about configuring Global VPNs?

A. For Gateways to be included in a Global VPN configuration, each must exchange the same shared-secret key to all Community member Gateways.
B. Remote-access VPNs are only available for use in a Global VPN for Security Gateways with VPN-1 Pro installed.
C. Site-to-site VPNs are only available for use in a Global VPN for Security Gateways with VPN-1 installed.
D. It is possible to have a single Customer participate in multiple Global VPN Communities.
E. To configure a Global VPN for gateways from different legal entities, the Security Gateways' CMAs must be configured on different MDS machines.

Answer: D

Q: 23 Two CMAs can be created for a single Customer, for High Availability (HA). Which of these statements is NOT correct for this type of CMA configuration?

A. Should a CMA fail for any reason, the Standby CMA can continue operation without service interruption.
B. If the Active CMA's data has not recently been synchronized with the Standby CMA, it can no longer be used to replace the Active CMA if fail over occurs.
C. Administrators make Security Policy changes through the Active CMA only.
D. The HA scheme requires one Primary CMA and one Secondary CMS, housed on different MDS computers.
E. The CMAs must be synchronized to maintain the same information.

Answer: B

Q: 24 By default, remote Security Gateways deployed as part of a Provider-1 configuration send their logs to the:

A. Local CLM only.
B. CLM located on the Secondary MDS, which is configured by default when a CMA is created.
C. CMA only.
D. Local firewall and CMA.
E. CLM located on the Primary MDS, which is configured by default when a CMA is created.

Answer: C

Q: 25 Which of the following Administrator types can migrate a SmartCenter Management Server into the Provider-1 system as a CMA?

A. Provider-1 Superuser
B. Provider-1 Manager
C. Customer Manager
D. Both the Provider-1 and Customer Managers
E. Both the Provider-1 and Customer Superusers

Answer: E


© 2014 Cheat-Test.com, All Rights Reserved