New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Checkpoint 156-115.80 Check Point Certified Security Master - R80 Exam Practice Test

Demo: 23 questions
Total 159 questions

Check Point Certified Security Master - R80 Questions and Answers

Question 1

The CPSizeMe script will run how long by default?

Options:

A.

48 hours

B.

12 hours

C.

8 hours

D.

24 hours

Question 2

Where will the command, “fw monitor -pi -vpn”, be inserted into the fw ctl chain?

Options:

A.

Before the Fw VM inbound

B.

Before the vpn module

C.

After the Fw VM outbound

D.

After the vpn module

Question 3

What effect would change the parameter of fwha_timer_cpha_res to 5 have on a cluster?

Options:

A.

Change the cluster interface active check to 5 milliseconds

B.

Change the cphad to send test packets every 5 milliseconds

C.

Change the sync network timeout to 5 seconds

D.

Change the failover delay timeout to 500 milliseconds

Question 4

Which command should be used to insert fw monitor before secxl_sync module?

Options:

A.

fw monitor –pi –secxl_sync –o capture.cap

B.

fw monitor –pl –secxl_sync –o capture.cap

C.

fw monitor –pO –secxl_sync –o capture.cap

D.

fw monitor –e “accept –pi –secxl_sync;” –o capture.cap

Question 5

Which kernel table stores information about NAT connections?

Options:

A.

connections

B.

tab_nat_conn

C.

xlate

D.

fwx_alloc

Question 6

Which of the following is true about Protocol Signatures?

Options:

A.

Enabling Protocol Signatures will restrict each protocol to its standard port.

B.

Signatures are pieces of information taken from both C2S packets that eventually identify the protocol

C.

Protocol signatures are supported on R77.30 and newer gateways

D.

Protocol signatures are enabled for all connections via the Global Properties menu

Question 7

What is the Debug Output path for the CPM process?

Options:

A.

$CPDIR/debug/cpm.elg

B.

/proc/sys/cp/cpm/cpm.csv

C.

/var/log/dbg/cpm.elg

D.

$FWDIR/log/cpm.elg

Question 8

What is the recommended command to manually initiate a failover on a cluster member in HA?

Options:

A.

Perform a cpstop on the standby member

B.

Perform a clusterXL_admin down on the standby member

C.

Perform a cpstop on the active member

D.

Perform a clusterXL_admin down on the active member

Question 9

What is the default and maximum number of entries in the ARP Cache Table in a Check Point appliance?

Options:

A.

1,024 and 4,096

B.

4,096 and 16,384

C.

4,096 and 65,536

D.

1,024 and 16,384

Question 10

Your company plans to start migration on IPv6 protocol. What steps do you need to perform to fully enable IPv6 protocol on the Security Gateway?

Options:

A.

Issue “set ipv6 enable”; Save configuration and reboot

B.

Issue “set ipv6-state on”; Save configuration and reboot

C.

Issue “set ipv6 on”; Save configuration and reboot

D.

Issue “set ipv6-state enable”; Save configuration and reboot

Question 11

The fw monitor output file type is?

Options:

A.

Binary

B.

ASCII text

C.

ZIP

D.

tar.gzip

Question 12

How can you print the session UUID and the UUID of a connection together in fw monitor?

Options:

A.

The switches –s and –u are mutually exclusive and cannot be printed together

B.

fw –s monitor –u –e “accept ;”

C.

fw monitor –uids –e “accept ;”

D.

fw monitor –s –u –e “accept ;”

Question 13

What occurs when Bypass Under Load activated?

Options:

A.

Packets are forwarded to the destination without checking the packets against the firewall rule base

B.

Packets are forwarded to the destination without performing IPS analysis

C.

To still ensure a minimum level of data integrity, the system revert to the use of MD5 instead of SHA-1, since former produces an output smaller than the latter

D.

The amount of the state table entries is decreased according to the LRU (least recently used) algorithm

Question 14

What ClusterXL mechanism is used to verify that the interfaces of other cluster members are UP and communicates the status of cluster members?

Options:

A.

PING

B.

CCP

C.

PPP

D.

HELLO

Question 15

How many layers are incorporated in IPS detection and what are they called?

Options:

A.

4 layers – Passive Streaming Library (PSL), Protocol Parsers, Context Management, Protections

B.

3 layers – Active Streaming Library (ASL), CMI, Protections

C.

4 layers – Active Streaming Library (ASL), Protocol Parsers, Context Management, Protections

D.

3 layers – Protocol Parsers, CMI, Protections

Question 16

Which of the following is NOT a vpn debug command used for troubleshoot?

Options:

A.

fw ctl debug –m fw + conn drop vm crypt

B.

vpn debug trunc

C.

mpclient getdata sslvpn

D.

vpn debug on TDERROR_ALL_ALL=5

Question 17

Which command query will search the database for instances of the following FW-Corporate object:

Options:

A.

select name from dleobjectderef_data where name = ‘FW-Corporate’;

B.

select data from dleobjectderef_data where name = ‘FW-Corporate’;

C.

select object ‘FW-Corporate’ from dleobjectderef_data;

D.

select name from dleobjectderef_table where name = ‘FW-Corporate’;

Question 18

Consider the IPv6 address: 2101:0DA0:080B:4114:0000:0000:0000:0001. According to IPv6 IP shortening rules, what address can this be shortened to?

Options:

A.

2101:0DA0:080B:4114::8:0

B.

2101:0DA0:80B:4114::0

C.

2101:0DA0:080B:4114::8:1

D.

2101:0DA0:80B:4114::1

Question 19

John works for ABC Corporation. His manager wants him to analyze the previous day’s resource usage on the firewall. John decides to use cpview. John knows that, by default cpview history enabled but he wants to verify whether someone has disabled it. Which command should John use to verify whether cpview history is enabled?

Options:

A.

cpview status

B.

cpstat

C.

cpview history stat

D.

cpview info

Question 20

Which Check Point utility should be used to assist in analyzing the output of vpn and ike debug?

Options:

A.

cpview

B.

cpinfo

C.

ikeview

D.

vpnview

Question 21

For organizations with existing IPv4 networks who wish to move to IPv6, which of the following is a Transition Mechanism that can be used?

Options:

A.

ipv4 to ipv6 Triple Stack

B.

Hex to Dec translation

C.

6 in 4 Tunneling

D.

NAT-T to NAT6sec

Question 22

How would an administrator view the routing table on the Security Gateway of production network where IPv6 is being used?

Options:

A.

show route –A inet6

B.

ip -6 addr show

C.

netstat –rn –A inet6

D.

ip -6 neigh show

Question 23

Which of the following is NOT a feature of ClusterXL?

Options:

A.

Transparent upgrades

B.

Zero downtime for mission-critical environments with State Synchronization

C.

Enhanced throughput in all ClusterXL modes (2 gateway cluster compared with 1 gateway)

D.

Transparent failover in case of device failures

Demo: 23 questions
Total 159 questions