Download Check Point Certified Security Master.156-115.77.RealExams.2018-10-05.179q.vcex

Vendor: Checkpoint
Exam Code: 156-115.77
Exam Name: Check Point Certified Security Master
Date: Oct 05, 2018
File Size: 2 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
The command fw ctl kdebug <params> is used to:
  1. list enabled debug parameters.
  2. read the kernel debug buffer to obtain debug messages.
  3. enable kernel debugging.
  4. select specific kernel modules for debugging.
Correct answer: B
Question 2
Compare these two images to establish which blade/feature was disabled on the firewall.  
  1. IPS
  2. VPN
  3. NAT
  4. L2TP
Correct answer: B
Question 3
What command would give you a summary of all the tables available to the firewall kernel?
  1. fw tab
  2. fw tab -s
  3. fw tab -h
  4. fw tab -o
Correct answer: B
Question 4
What flag option(s) must be used to dump the complete table in friendly format, assuming there are more than one hundred connections in the table?
  1. fw tab -t connections -f
  2. fw tab -t connect -f -u 
  3. fw tab -t connections -s
  4. fw tab -t connections -f –u
Correct answer: B
Question 5
Which directory below contains the URL Filtering engine update info? Here you can also go to see the status of the URL Filtering and Application Control updates.
  1. $FWDIR/urlf/update
  2. $FWDIR/appi/update
  3. $FWDIR/appi/urlf
  4. $FWDIR/update/appi
Correct answer: B
Question 6
You are troubleshooting a Security Gateway, attempting to determine which chain is causing a problem. 
What command would you use to show all the chains through which traffic passed?
  1. [Expert@HostName]# fw ctl chain
  2. [Expert@HostName]# fw monitor -e "accept;" -p all
  3. [Expert@HostName]# fw ctl debug –m
  4. [Expert@HostName]# fw ctl zdebug all
Correct answer: B
Question 7
True or False: Software blades perform their inspection primarily through the kernel chain modules.
  1. False. Software blades do not pass through the chain modules.
  2. True. Many software blades have their own dedicated kernel chain module for inspection.
  3. True. All software blades are inspected by the IP Options chain module.
  4. True. Most software blades are inspected by the TCP streaming or Passive Streaming chain module.
Correct answer: B
Question 8
You are running a debugging session and you have set the debug environment to TDERROR_ALL_ALL=5 using the command export TDERROR_ALL_ALL=5. 
How do you return the debug value to defaults?
  1. fw ctl debug 0x1ffffe0
  2. fw debug 0x1ffffe0
  3. export TDERROR_ALL_ALL
  4. unset TDERROR_ALL_ALL
Correct answer: D
Question 9
What command would you use to view which debugs are set in your current working environment?
  1. “env” and “fw ctl debug” 
  2. “cat /proc/etc”
  3. “fw ctl debug all”
  4. “export”
Correct answer: A
Question 10
What causes the SIP Early NAT chain module to appear in the chain?
  1. The SIP traffic is trying to pass through the firewall.
  2. SIP is configured in IPS.
  3. A VOIP domain is configured.
  4. The default SIP service is used in the Rule Base.
Correct answer: D

Use VCE Exam Simulator to open VCE files


Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!