Download Checkpoint.156-115.80.PracticeTest.2017-12-22.295q.vcex

Download Exam

File Info

Exam Check Point Certified Security Master R80
Number 156-115.80
File Name Checkpoint.156-115.80.PracticeTest.2017-12-22.295q.vcex
Size 5 MB
Posted Dec 22, 2017
Download Checkpoint.156-115.80.PracticeTest.2017-12-22.295q.vcex


How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

What command would you use for a packet capture on an absolute position for TCP streaming (out) 1ffffe0


  1. fw ctl chain -po 1ffffe0 -o monitor.out
  2. fw monitor -po -0x1ffffe0 -o monitor.out
  3. fw monitor -e 0x1ffffe0 -o monitor.out
  4. fw monitor -pr 1ffffe0 -o monitor.out
Correct answer: B



Question 2

The command fw monitor -p all displays what type of information?


  1. It captures all points of the chain as the packet goes through the firewall kernel.
  2. This is not a valid command.
  3. The -p is used to resolve MAC address in the firewall capture.
  4. It does a firewall monitor capture on all interfaces.
Correct answer: A



Question 3

What does the IP Options Strip represent under the fw chain output?


  1. IP Options Strip is not a valid fw chain output.
  2. The IP Options Strip removes the IP header of the packet prior to be passed to the other kernel functions.
  3. The IP Options Strip copies the header details to forward the details for further IPS inspections.
  4. IP Options Strip is only used when VPN is involved.
Correct answer: B



Question 4

The command that lists the firewall kernel modules on a Security Gateway is:


  1. fw list kernel modules
  2. fw ctl kernel chain
  3. fw ctl debug -m
  4. fw list modules
Correct answer: C



Question 5

Which of the following BEST describes the command fw ctl chain function?


  1. View how CoreXL is distributing traffic among the firewall kernel instances.
  2. View established connections in the connections table.
  3. View the inbound and outbound kernel modules and the order in which they are applied.
  4. Determine if VPN Security Associations are being established.
Correct answer: C



Question 6

The command _____________ shows which firewall chain modules are active on a gateway.


  1. fw stat
  2. fw ctl debug
  3. fw ctl chain
  4. fw ctl multik stat
Correct answer: C



Question 7

The command fw ctl kdebug <params> is used to:


  1. list enabled debug parameters.
  2. read the kernel debug buffer to obtain debug messages.
  3. enable kernel debugging.
  4. select specific kernel modules for debugging.
Correct answer: B



Question 8

Compare these two images to establish which blade/feature was disabled on the firewall.  
(Click the Exhibits button)   


  1. IPS
  2. VPN
  3. NAT
  4. L2TP
Correct answer: B



Question 9

What command would give you a summary of all the tables available to the firewall kernel?


  1. fw tab
  2. fw tab -s
  3. fw tab -h
  4. fw tab -o
Correct answer: B



Question 10

What flag option(s) must be used to dump the complete table in friendly format, assuming there are more than one hundred connections in the table?


  1. fw tab -t connections -f
  2. fw tab -t connect -f -u
  3. fw tab -t connections -s
  4. fw tab -t connections -f –u
Correct answer: B









PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files