Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Checkpoint 156-115.77 Dumps

Page: 1 / 11
Total 295 questions

Check Point Certified Security Master Questions and Answers

Question 1

Which FW-1 kernel flags should be used to properly debug and troubleshoot NAT issues?

Options:

A.

nat, route, conn, fwd, zeco, err

B.

nat, xlate, fwd, vm, ld, chain

C.

nat, xltrc, xlate, drop, conn, vm

D.

nat, drop, conn, xlate, filter, ioctl

Question 2

By default, the size of the fwx_alloc table is:

Options:

A.

65535

B.

65536

C.

25000

D.

1024

Question 3

You are attempting to establish an FTP session between your computer and a remote server, but it is not being completed successfully. You think the issue may be due to IPS. Viewing SmartView Tracker shows no drops. How would you confirm if the traffic is actually being dropped by the gateway?

Options:

A.

Search the connections table for that connection.

B.

Run a fw monitor packet capture on the gateway.

C.

Look in SmartView Monitor for that connection to see why it’s being dropped.

D.

Run fw ctl zdebug drop on the gateway.

Question 4

Which flag in the fw monitor command is used to print the position of the kernel chain?

Options:

A.

-all

B.

-k

C.

-c

D.

-p

Question 5

Which is NOT a valid upgrade method in an R77 GAiA ClusterXL deployment?

Options:

A.

Optimal Service Upgrade

B.

Full Connectivity Upgrade

C.

Minimal Effort Upgrade

D.

Automatic Incremental Upgrade

Question 6

You run the commands:

fw ctl debug 0

fw ctl debug -buf 32000

Which of the following commands would be best to troubleshoot a clustering issue?

Options:

A.

fw ctl zdebug -m cluster + all

B.

fw ctl debug -m CLUSTER + conf stat

C.

fw ctl debug -m cluster + pnote stat if

D.

fw ctl kdebug -m CLUSTER all

Question 7

When viewing connections using the command fw tab -t connections, all entries are displayed with a 6-tuple key, the elements of the 6-tuple include the following EXCEPT:

Options:

A.

destination port number

B.

source port number

C.

direction (inbound / outbound)

D.

interface id

Question 8

Which command can be used to see all active modules on the Security Gateway:

Options:

A.

fw ctl zdebug drop

B.

fw ctl debug -h

C.

fw ctl chain

D.

fw ctl debug -m

Question 9

A system administrator wants to convert an IPv6 gateway from a standard gateway into a gateway running VSX mode. What does he need to consider?

Options:

A.

It is not possible to convert a gateway with IPv6 enabled to VSX mode.

B.

There needs to be proper IPv6 routing setup.

C.

At least two interfaces need to be configured with IPv6.

D.

Policy needs to be properly applied to the gateway before converting the system to VSX mode.

Question 10

Which of these commands can be used to display the IPv6 status?

Options:

A.

show ipv6-stat

B.

show ipv6 all

C.

show ipv6 status

D.

show ipv6-status

Question 11

Which of the following statements about Full HA support with IPv6 is NOT true?

Options:

A.

There is no Dynamic Routing with IPv6.

B.

Mirrored Interfaces must have IPv4 addresses.

C.

Sync traffic must be IPv4.

D.

IPv6 does not support a Secondary Management Server.

Question 12

Does R77 SmartDashboard support IPv6?

Options:

A.

Yes provided the operating system on which Smart Dashboard is installed is configured with IPv6.

B.

SmartDashboard does not support IPv6.

C.

IPv6 needs to be tunneled through IPv4 to support IPv6.

D.

R77.20 and above provides the support for Smart Dashboard and IPv6 support.

Question 13

What do the ‘F’ flags mean in the output of fwaccel conns?

Options:

A.

Forward to firewall

B.

Flag set for debug

C.

Fast path packets

D.

Flow established

Question 14

While troubleshooting high CPU usage on cores 3 and 4 on a cluster, you notice the following output of fwaccel stats -s:

What could be a possible cause of the high CPU usage?

Options:

A.

Connections are being partially accelerated by SecureXL, but too many packets are still being processed by the firewall kernel.

B.

The Secure Network Dispatcher (SND) is having to process too much inbound traffic from the NICs.

C.

Connections are not being accelerated by SecureXL, and all packets are being forwarded to firewall kernel instances for inspection.

D.

The Secure Network Dispatcher (SND) is working too hard to distribute the traffic to the acceleration layer.

Question 15

Certain rules will disable connection rate acceleration (templates) in the Rule Base. What command should be used to determine on what rule templates are disabled?

Options:

A.

cpconfig

B.

cphaprob -a if

C.

fw ctl pstat

D.

fwaccel stat

Question 16

Which of the following statements are TRUE about SecureXL?

I. SecureXL is able to accelerate all connections through the firewall.

II. Medium path acceleration will still cause some CPU utilization of CoreXL cores.

III. F2F connections represent “forwarded to firewall” connections that are not accelerated and fully processed through the firewall kernel.

IV. Packets going through SecureXL must be inspected by the firewall kernel before being accelerated.

Options:

A.

II and III

B.

I, II, and III

C.

III and IV

D.

I and IV

Question 17

Which of the following IPS Layers is the "brain" of the IPS? That is, what coordinates between different components, decides which protections should run on a certain packet, decides the final action to be performed on the packet and issues an event log?

Options:

A.

Protections

B.

Passive Streaming Library (PSL)

C.

Protocol Parsers

D.

Context Management Interface layer (CMI)

Question 18

You have strict IPS corporate guidelines. This is having a performance impact on the firewall. What steps could you take to minimize this impact without compromising the corporate policy?

Options:

A.

Select “Protect Internal hosts only”

B.

Select “Bypass IPS inspection when gateway is under heavy load”

C.

Select “Perform IPS inspection on all traffic”

D.

Without minimizing signatures you cannot improve performance

Question 19

You have spent time configuring the IPS profile on your primary gateway firewall. You want to ensure that this profile can be applied to all gateway firewalls in your environment. How can you share this information between firewalls?

Options:

A.

From the command line, run: ips_export [-o ] [-p ].

B.

IPS profiles must be manually configured on each gateway.

C.

From the Smart Dashboard IPS tab select export IPS profiles and select the gateway to send this export to.

D.

From the command line, run: ips_export_import export [-o ] [-p ].

Question 20

When using Geo Protections, you find there are logs for a country that you believe is incorrect. What file do you review to verify what country Geo Protections should identify the traffic as?

Options:

A.

asm.C

B.

objects.C

C.

objects_5_0.C

D.

IpToCountry.csv

Question 21

Why would you choose to combine dynamic routing protocols and VPNs?

Options:

A.

All options listed.

B.

In the case of one tunnel failure, other tunnels may be used to route the traffic.

C.

Dynamic-routing information can propagate over the VPN, utilizing the VPN as just another point-to-point link in the network.

D.

The VPN device can be automatically updated with network changes on any VPN peer Gateway without the need to update the VPN Domain's configuration.

Question 22

Where can you configure Wire mode?

Options:

A.

In Global properties

B.

In the gateway object on the “IPSec VPN” > “VPN Advanced” page

C.

In sysconfig

D.

In CLISH

Question 23

When configuring a Numbered VPN-Tunnel, what parameters are necessary?

Options:

A.

VPN Tunnel ID, Local Address, Remote Address

B.

Peer, Local Address, Remote Address

C.

VPN Tunnel ID, Peer, Local Address, Remote Address

D.

VPN Tunnel ID, Peer, Physical Device

Question 24

Where would an administrator set an email alert for a specific permanent VPN tunnel?

Options:

A.

Edit the file vpnconf.

B.

Run sysconfig.

C.

In the Tunnel Properties select Mail Alert.

D.

You can only enable logging or SNMP traps.

Question 25

Under which scenario would you most likely consider the use of Multi-Queue?

Options:

A.

When IPS is heavily used.

B.

When most of the traffic is accelerated.

C.

When most of the processing is done in CoreXL.

D.

When trying to increase session rate.

Question 26

You have a user-defined SMTP trap configured to send an alert to your mail server, and you also have SmartView Monitor configured to trigger the alert whenever policy is pushed to your gateway. However, you are not getting any mails even when you test for pushing policy. What process should you troubleshoot on the Management Server?

Options:

A.

fwd

B.

fwm

C.

cpwd_admin

D.

cpstat_monitor

Question 27

what command other than fw ctl pstat, will display your peak concurrent connections?

Options:

A.

fw ctl get int fw_peak_connections

B.

netstat -ni

C.

fw tab -t connections -s

D.

top

Question 28

You are finding that some users are complaining about slow connection speed. You would like to review a summary of your connections, including which connections are accelerated and those that are not. What command could you use?

Options:

A.

fw ctl pstat

B.

fwaccel perf

C.

fw tab -t connections -s

D.

fwaccel stats -s

Question 29

Misha is working on a stand-by firewall and deletes the connections table in error. He finds that now the table is out of sync with the Active member. to get them completely synced again, Mish should run the command pair ____________ and __________ .

Options:

A.

fw ctl sync stop, fw ctl sync start

B.

fw ctl setsync off, fw ctl setsync start

C.

fw ctl setsync stop, fw ctl setsync on

D.

fw ctl setsync off, fw ctl setsync on

Question 30

How does the Check Point Security Administrator enable NAT Templates?

Options:

A.

Run commands with syntax fw ctl set int cphwd_nat_templates_support 1 and fw ctl set int cphwd_nat_templates_enabled 1.

B.

Edit file $FWDIR/boot/modules/fwkern.conf with the lines “cphwd_nat_templates_support=1” and “cphwd_nat_templates_enabled=1”.

C.

Set Firewall object > NAT > Advanced

D.

Set Global properties > NAT-Network address translation

Question 31

In a ClusterXL cluster with delayed synchronization, which of the following is not true?

Options:

A.

The length of time for the delay can be edited.

B.

It applies only to TCP services whose Protocol Type is set to HTTP or None.

C.

Delayed Synchronization is disabled if the Track option in the rule is set to Log or Account.

D.

Delayed Synchronization is performed only for connections matching a SecureXL Connection Template.

Question 32

What is one way to check cluster status on two gateways running in HA mode?

Options:

A.

show cluster

B.

cphaprob stat

C.

cp ha prob stat

D.

show cluster ha status

Question 33

When troubleshooting a performance problem on multicore firewall that is using CoreXL, what command checks the number of connections each core is processing?

Options:

A.

sim affinity -l

B.

cat fwkern.conf

C.

fw CTL pstat

D.

fw ctl multik stat

Question 34

You are at a customer site, and when you run cphaprob stat you are not seeing a normal ClusterXL Health. What command could you run verify the number of cores are not matched on both cluster members?

Options:

A.

cpconfig

B.

cphaprob -a if

C.

fw ctl multik stat

D.

cphaprob stat

Question 35

What command verifies which core each gateway interface and firewall instance is currently running on?

Options:

A.

fw ctl pstat

B.

fw accel stat

C.

show corexl stat

D.

fw ctl affinity -l

Question 36

Your customer has a well optimized Rule Base with most traffic accelerated by SecureXL.  They are still seeing slow performance.   They are using an 8 core machine.  They see the following output from fw ctl affinity -l. What could be done to improve performance with this deployment?

Options:

A.

Increase the number of cores dedicated to logging.

B.

Increase the number of Secure Network Dispatchers as the accelerated traffic is not passed to a worker core.

C.

Add more CPU resources to the hardware.

D.

Upgrade to SAM hardware.

Question 37

The command that lists the firewall kernel modules on a Security Gateway is:

Options:

A.

fw list kernel modules

B.

fw ctl kernel chain

C.

fw ctl debug -m

D.

fw list modules

Question 38

What does the IP Options Strip represent under the fw chain output?

Options:

A.

IP Options Strip is not a valid fw chain output.

B.

The IP Options Strip removes the IP header of the packet prior to be passed to the other kernel functions.

C.

The IP Options Strip copies the header details to forward the details for further IPS inspections.

D.

IP Options Strip is only used when VPN is involved.

Question 39

The command fw monitor -p all displays what type of information?

Options:

A.

It captures all points of the chain as the packet goes through the firewall kernel.

B.

This is not a valid command.

C.

The -p is used to resolve MAC address in the firewall capture.

D.

It does a firewall monitor capture on all interfaces.

Question 40

Compare these two images to establish which blade/feature was disabled on the firewall.

Options:

A.

IPS

B.

VPN

C.

NAT

D.

L2TP

Question 41

What is the log file that shows the keep alive packets during the debug process?

Options:

A.

$FWDIR/log/ikev2.xmll

B.

$FWDIR/log/ike.xmll

C.

$FWDIR/log/ike.elg

D.

$FWDIR/log/vpnd.elg

Question 42

Check Point Best Practices suggest that when you finish a kernel debug, you should run the command _____________________ .

Options:

A.

fw debug 0

B.

fw debug off

C.

fw ctl debug default

D.

fw ctl debug 0

Question 43

Which command will you run to list established VPN tunnels?

Options:

A.

fw tab -t vpn_active

B.

vpn compstat

C.

fw tab -t vpn_routing

D.

vpn tu

Question 44

You are troubleshooting your VPN and are reviewing the output of your command fw monitor, shown below. What can you determine from the following output?

Options:

A.

The fw monitor command cannot display the relevant information since it is encrypted traffic

B.

NAT is not being applied to the IP address 10.10.10.86

C.

There is no issue, since the traffic is being seen at all points in the inspection kernel

D.

Traffic is not being encrypted

Page: 1 / 11
Total 295 questions