Download Checkpoint.156-115.77.RealExams.2018-10-05.179q.vcex

Download Exam

File Info

Exam Check Point Certified Security Master
Number 156-115.77
File Name Checkpoint.156-115.77.RealExams.2018-10-05.179q.vcex
Size 2 MB
Posted Oct 05, 2018
Download Checkpoint.156-115.77.RealExams.2018-10-05.179q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

The command fw ctl kdebug <params> is used to:


  1. list enabled debug parameters.
  2. read the kernel debug buffer to obtain debug messages.
  3. enable kernel debugging.
  4. select specific kernel modules for debugging.
Correct answer: B



Question 2

Compare these two images to establish which blade/feature was disabled on the firewall.  
    


  1. IPS
  2. VPN
  3. NAT
  4. L2TP
Correct answer: B



Question 3

What command would give you a summary of all the tables available to the firewall kernel?


  1. fw tab
  2. fw tab -s
  3. fw tab -h
  4. fw tab -o
Correct answer: B



Question 4

What flag option(s) must be used to dump the complete table in friendly format, assuming there are more than one hundred connections in the table?


  1. fw tab -t connections -f
  2. fw tab -t connect -f -u 
  3. fw tab -t connections -s
  4. fw tab -t connections -f –u
Correct answer: B



Question 5

Which directory below contains the URL Filtering engine update info? Here you can also go to see the status of the URL Filtering and Application Control updates.


  1. $FWDIR/urlf/update
  2. $FWDIR/appi/update
  3. $FWDIR/appi/urlf
  4. $FWDIR/update/appi
Correct answer: B



Question 6

You are troubleshooting a Security Gateway, attempting to determine which chain is causing a problem. 
What command would you use to show all the chains through which traffic passed?


  1. [Expert@HostName]# fw ctl chain
  2. [Expert@HostName]# fw monitor -e "accept;" -p all
  3. [Expert@HostName]# fw ctl debug –m
  4. [Expert@HostName]# fw ctl zdebug all
Correct answer: B
Explanation:



Question 7

True or False: Software blades perform their inspection primarily through the kernel chain modules.


  1. False. Software blades do not pass through the chain modules.
  2. True. Many software blades have their own dedicated kernel chain module for inspection.
  3. True. All software blades are inspected by the IP Options chain module.
  4. True. Most software blades are inspected by the TCP streaming or Passive Streaming chain module.
Correct answer: B



Question 8

You are running a debugging session and you have set the debug environment to TDERROR_ALL_ALL=5 using the command export TDERROR_ALL_ALL=5. 
How do you return the debug value to defaults?


  1. fw ctl debug 0x1ffffe0
  2. fw debug 0x1ffffe0
  3. export TDERROR_ALL_ALL
  4. unset TDERROR_ALL_ALL
Correct answer: D



Question 9

What command would you use to view which debugs are set in your current working environment?


  1. “env” and “fw ctl debug” 
  2. “cat /proc/etc”
  3. “fw ctl debug all”
  4. “export”
Correct answer: A



Question 10

What causes the SIP Early NAT chain module to appear in the chain?


  1. The SIP traffic is trying to pass through the firewall.
  2. SIP is configured in IPS.
  3. A VOIP domain is configured.
  4. The default SIP service is used in the Rule Base.
Correct answer: D









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files