Download Check Point Certified Security Master R80.156-115.80.PracticeTest.2017-12-22.295q.vcex

Vendor: Checkpoint
Exam Code: 156-115.80
Exam Name: Check Point Certified Security Master R80
Date: Dec 22, 2017
File Size: 5 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
What command would you use for a packet capture on an absolute position for TCP streaming (out) 1ffffe0
  1. fw ctl chain -po 1ffffe0 -o monitor.out
  2. fw monitor -po -0x1ffffe0 -o monitor.out
  3. fw monitor -e 0x1ffffe0 -o monitor.out
  4. fw monitor -pr 1ffffe0 -o monitor.out
Correct answer: B
Question 2
The command fw monitor -p all displays what type of information?
  1. It captures all points of the chain as the packet goes through the firewall kernel.
  2. This is not a valid command.
  3. The -p is used to resolve MAC address in the firewall capture.
  4. It does a firewall monitor capture on all interfaces.
Correct answer: A
Question 3
What does the IP Options Strip represent under the fw chain output?
  1. IP Options Strip is not a valid fw chain output.
  2. The IP Options Strip removes the IP header of the packet prior to be passed to the other kernel functions.
  3. The IP Options Strip copies the header details to forward the details for further IPS inspections.
  4. IP Options Strip is only used when VPN is involved.
Correct answer: B
Question 4
The command that lists the firewall kernel modules on a Security Gateway is:
  1. fw list kernel modules
  2. fw ctl kernel chain
  3. fw ctl debug -m
  4. fw list modules
Correct answer: C
Question 5
Which of the following BEST describes the command fw ctl chain function?
  1. View how CoreXL is distributing traffic among the firewall kernel instances.
  2. View established connections in the connections table.
  3. View the inbound and outbound kernel modules and the order in which they are applied.
  4. Determine if VPN Security Associations are being established.
Correct answer: C
Question 6
The command _____________ shows which firewall chain modules are active on a gateway.
  1. fw stat
  2. fw ctl debug
  3. fw ctl chain
  4. fw ctl multik stat
Correct answer: C
Question 7
The command fw ctl kdebug <params> is used to:
  1. list enabled debug parameters.
  2. read the kernel debug buffer to obtain debug messages.
  3. enable kernel debugging.
  4. select specific kernel modules for debugging.
Correct answer: B
Question 8
Compare these two images to establish which blade/feature was disabled on the firewall.  
(Click the Exhibits button)   
  1. IPS
  2. VPN
  3. NAT
  4. L2TP
Correct answer: B
Question 9
What command would give you a summary of all the tables available to the firewall kernel?
  1. fw tab
  2. fw tab -s
  3. fw tab -h
  4. fw tab -o
Correct answer: B
Question 10
What flag option(s) must be used to dump the complete table in friendly format, assuming there are more than one hundred connections in the table?
  1. fw tab -t connections -f
  2. fw tab -t connect -f -u
  3. fw tab -t connections -s
  4. fw tab -t connections -f –u
Correct answer: B

Use VCE Exam Simulator to open VCE files


Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!