CheckPoint 156-315.81 Check Point Certified Security Expert - R81.20 Exam Practice Test

Page: 1 / 14
Total 624 questions
Question 1

identity Awareness allows easy configuration for network access, and auditing based on what three items?



Answer : B


Question 2
Question 3

What kind of information would you expect to see when using the "sim affinity -I" command?



Answer : C

The ''sim affinity -I'' command is a command that displays the affinity distribution of the Security Gateway's interfaces. Affinity distribution is the assignment of CPU cores to handle the traffic from different interfaces. The ''sim affinity -I'' command shows the following information for each interface:

The interface name, such as eth0, eth1, etc.

The interface index, such as 0, 1, 2, etc.

The interface type, such as physical, bond, VLAN, etc.

The interface state, such as up or down

The interface speed, such as 1000 Mbps, 10000 Mbps, etc.

The interface MTU, such as 1500, 9000, etc.

The interface MAC address, such as 00:11:22:33:44:55

The interface IP address, such as 192.168.1.1, 10.0.0.1, etc.

The interface affinity mask, such as 0x00000001, 0x00000002, etc. The affinity mask is a hexadecimal value that represents the CPU cores that are assigned to handle the traffic from the interface. For example, 0x00000001 means that only CPU core 0 is assigned, 0x00000003 means that CPU cores 0 and 1 are assigned, and so on.

The ''sim affinity -I'' command can help you to monitor and optimize the performance of your Security Gateway by showing you how the traffic load is distributed among the CPU cores. You can also use the ''sim affinity'' command with other options to change the affinity settings of the interfaces or the firewall instances. For more information, you can refer to the Check Point R81.20 (Titan) Resolved Issues and Enhancements1 or the Solved: Sim Affinity - Check Point CheckMates2.


Question 4

Which type of Endpoint Identity Agent includes packet tagging and computer authentication?



Answer : A

The type of Endpoint Identity Agent that includes packet tagging and computer authentication is Full. Packet tagging is a feature that allows the Endpoint Identity Agent to add a tag to the packets sent by the user's device, which contains the user's identity information. This way, the Security Gateway can identify the user without requiring additional authentication methods. Computer authentication is a feature that allows the Endpoint Identity Agent to authenticate the user's device using a certificate, which ensures that only authorized devices can access the network resources. The Full Endpoint Identity Agent supports both packet tagging and computer authentication, as well as other features such as Single Sign-On (SSO), Multi-Factor Authentication (MFA), and VPN.

The references are:

Check Point R81 Identity Awareness Administration Guide, page 15

Endpoint Identity Agent - Check Point CheckMates

Check Point Identity Agent - All flavors for Windows OS in a single package (Full, Light, v1 and v2 for Terminal Server)


Question 5

The installation of a package via SmartConsole CANNOT be applied on



Answer : A


Question 6

Which of the following is an authentication method used for Identity Awareness?



Answer : C

Captive Portal is one of the authentication methods used for Identity Awareness, which is a feature of Check Point that enables you to identify users and apply security policy rules based on their identity. Captive Portal redirects users to a web page where they can enter their credentials and be authenticated by an external server, such as LDAP or RADIUS. After authentication, users can access the Internet and corporate resources according to the security policy rules that apply to their identity.

The references are:

Machine Authentication & Identity Awareness - Check Point CheckMates

Check Point Certified Security Expert R81.20, slide 13

Check Point R81 Identity Awareness Administration Guide, page 9


Question 7

What is the purpose of Captive Portal?



Answer : B

Captive Portal is a feature of Identity Awareness Software Blade that enables you to identify users who are not authenticated by other methods, such as Active Directory or VPN. Captive Portal redirects users to a web page where they can enter their credentials and be authenticated by an external server, such as LDAP or RADIUS. After authentication, users can access the Internet and corporate resources according to the security policy rules that apply to their identity.

The references are:

Check Point R81 Identity Awareness Administration Guide, page 9

Configuring Browser-Based Authentication in SmartConsole


Page:    1 / 14   
Total 624 questions