Black Friday Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Note! Checkpoint has retired the 156-115.80 Exam Contact us through Live Chat or email us for more information.

156-115.80 Check Point Certified Security Master - R80 Questions and Answers

Questions 4

Where will the usermode core files located?

Options:

A.

/var/log/dump/usermode

B.

/var/suroot

C.

$FWDIR/var/log/dump/usermode

D.

$CPDIR/var/log/dump/usermode

Buy Now
Questions 5

If you are experiencing performance issues on a gateway and you suspect it may be related to the interfaces, what command will assist in determining if packets are not being received into the gateway?

Options:

A.

netstat –rn

B.

show arp dynamic all

C.

ifconfig -a and look for RX drops

D.

ifconfig –a and look for TX drops

Buy Now
Questions 6

What is the role of FWM process in Check Point R80.10 Security Management architecture?

Options:

A.

It is called by CPM process to perform verification and conversion of the database

B.

FWM is used to transfer CPsets from management to the gateway

C.

FWM prepares and loads commit functions to execute the policy

D.

Policy installation command initiated from SmartConsole is sent to FWM

Buy Now
Questions 7

Static NAT has been configured and NAT rules were created automatically. The global properties option “Translate destination on client side” is not checked. Clients are complaining that they are not able to connect to one of your web servers using its public address. How would you solve the problem without changing the global properties and reinstalling the security policy?

Options:

A.

On the security gateway, add a static route for the web server’s public ip address

B.

Rebooting the security gateway will resolve the problem

C.

You will have the global properties and reinstall the security policy

D.

Configure manual NAT

Buy Now
Questions 8

Your company plans to start migration on IPv6 protocol. What steps do you need to perform to fully enable IPv6 protocol on the Security Gateway?

Options:

A.

Issue “set ipv6 enable”; Save configuration and reboot

B.

Issue “set ipv6-state on”; Save configuration and reboot

C.

Issue “set ipv6 on”; Save configuration and reboot

D.

Issue “set ipv6-state enable”; Save configuration and reboot

Buy Now
Questions 9

Which of the following ports are used for SIC?

Options:

A.

18355 and 18356

B.

18210 and 18211

C.

257 and 258

D.

18192 and 18193

Buy Now
Questions 10

You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?

Options:

A.

Eliminate all possible contradictory rules such as the Stealth or Cleanup rules

B.

Create a separate Security Policy package for each remote Security Gateway

C.

Create network objects that restrict all applicable rules to only certain networks

D.

Run separate SmartConsole instances to login and configure each Security Gateway directly

Buy Now
Questions 11

Which command is used to enable IPv6 on Security Gateway?

Options:

A.

set ipv6-state on

B.

add ipv6 interface on

C.

set ipv6-enable on

D.

set ipv6-state enabled

Buy Now
Questions 12

Which kernel table stores information about NAT connections?

Options:

A.

connections

B.

tab_nat_conn

C.

xlate

D.

fwx_alloc

Buy Now
Questions 13

The CPM process uses what ports?

Options:

A.

19009 and 18120

B.

18265 and 257

C.

19009 and 9009

D.

18265 and 9009

Buy Now
Questions 14

URL Filtering is an essential part of Web Security in the Gateway. For the Security Gateway to perform a URL lookup when a client makes a URL request, where is the sync-request forwarded from if a sync-request is required?

Options:

A.

RAD Kernel Space

B.

URLF Kernel Client

C.

URLF Online Service

D.

RAD User Space

Buy Now
Questions 15

If certain services should not use the Cluster Object IP Address, but requires the use of the individual Cluster Member IPs, what steps would be required for configuration?

Options:

A.

Create Manual NAT rules in the Security Policy

B.

The configuration is not possible

C.

Edit the table.def file on the Management Server

D.

Edit the fwkern.conf on each Cluster Member

Buy Now
Questions 16

What is the proper syntax to enter the “central database” that contains all objects within the Postgres database?

Options:

A.

psql_client cpm postgres

B.

psql_client checkpoint postgres

C.

psql_client central_database postgres

D.

In clish: show postgres main

Buy Now
Questions 17

Which Check Point daemon, if it stops responding or goes down, results in connections from the SmartConsole to the Management Server failing?

Options:

A.

SMSD

B.

CPTA

C.

CPM

D.

FWD

Buy Now
Questions 18

Which of the following is true about Protocol Signatures?

Options:

A.

Enabling Protocol Signatures will restrict each protocol to its standard port.

B.

Signatures are pieces of information taken from both C2S packets that eventually identify the protocol

C.

Protocol signatures are supported on R77.30 and newer gateways

D.

Protocol signatures are enabled for all connections via the Global Properties menu

Buy Now
Questions 19

Having a look at the output of the “fwaccel conns” command, the F flag is the indicator for a packet

.

Options:

A.

getting the routing information according to the Forwarding Information Base (FIB)

B.

being processed by the firewall kernel module

C.

going through the slow path

D.

being forced of using the accelerated path

Buy Now
Questions 20

Fill in the blank: The commandprovides the most complete restoration of a R80 configuration.

Options:

A.

upgrade_import

B.

cpconfig

C.

fwm dbimport –p

D.

cpinfo -recover

Buy Now
Questions 21

What is the difference between disabling SecureXL by running “fwaccel off” and disabling it via cpconfig?

Options:

A.

Disabling SecureXL in cpconfig survives reboot

B.

cpconfig option is available only on the security manager

C.

There is no difference. These are two different ways of accomplishing the same task

D.

“fwaccel off” will survive the reboot but cpconfig will not

Buy Now
Questions 22

Joey’s implementing a new R80.10 firewall cluster into the network. During the implementation he notices that the cluster object is in error state in SmartConsole. He tries to figure out the cause of the problem and runs a ClusterXL kernel debug with command: ‘fw ctl debug –m cluster + stat pnote conf ccp’

ClusterXL kernel debug shows him following info: fwha_set_new_local_state: Old version HA machines exist around so prevent state change to READY.

How can he solve the problem?

Options:

A.

cphaconf cluster_id set

B.

cphaprob mmagic

C.

Connect with GuiDBedit Tool to Security Management Server. Go to Table – Network Objects – network_objects. Select the relevant R80.10 Cluster object. Go to Search menu – Find – paste mac_magic. Right-click on the mac_magic the object – select Edit… and change the value to 254. Save changes and install policy.

D.

Connect with GuiDBedit Tool to Security Management Server. Go to Table – Network Objects – network_objects. Select the relevant R80.10 Cluster object. Go to Search menu – Find – paste cluster_magic. Right-click on the cluster_magic the object – select Edit… and change the value between 1 and 253. Save changes and install policy.

Buy Now
Questions 23

When troubleshooting Hide NAT failure, what step should be taken after the NAT configuration has been verified?

Options:

A.

Verify that the gateway answers the ARP requests

B.

Run fw tab –t fwx_alloc to verify that the fwx_alloc table is not filled up

C.

Run fw ctl arp to verify that the static addresses are loaded

D.

Verify the NAT configuration

Buy Now
Exam Code: 156-115.80
Exam Name: Check Point Certified Security Master - R80
Last Update: Nov 23, 2024
Questions: 159