Questions And Answers PDF
CheckPoint 156-115.77 Check Point Certified Security Master
Version: DEMO
http://www.TestWarrior.com/156-115.77-practice-exam.html
FOR 156-115.77 Candidates: We offer Two Products: 1st - We have Practice Tests Software with Actual Exam Questions 2nd - Questions and Answers in PDF Format. Try a Free DEMO of these Exam Products via below Link:
http://www.TestWarrior.com/156-115.77-practice-exam.html
TestWarrior.com
1
Questions And Answers PDF
Question 1 What command would you use for a packet capture on an absolute positon for TCP streaming (out) 1ffef A. fw ctl chain -po 1ffef -o monitor.out B. fw monitor -po -fx1ffef -o monitor.out C. fw monitor -e fx1ffef -o monitor.out D. fw monitor -pr 1ffef -o monitor.out
Aoswern B Question 2 The command fw monitor -p all displays what type of informatonn A. It captures all points of the chain as the packet goes through the frewall kernel. B. This is not a valid command. C. The -p is used to resolve MAC address in the frewall capture. D. It does a frewall monitor capture on all interfaces.
Aoswern A Question 3 What does the IP Optons Strip represent under the fw chain outputn A. IP Optons Strip is not a valid fw chain output. B. The IP Optons Strip removes the IP header of the packet prior to be passed to the other kernel functons. C. The IP Optons Strip copies the header details to forward the details for further IPS inspectons. D. IP Optons Strip is only used when VPN is involved.
Aoswern B Question 4 The command that lists the frewall kernel modules on a Security Gateway is: A. fw list kernel modules B. fw ctl kernel chain C. fw ctl debug -m D. fw list modules
Aoswern C
TestWarrior.com
2
Questions And Answers PDF
Question 5 Which of the following BEST describes the command fw ctl chain functonn A. View how CoreXL is distributng trafc among the frewall kernel instances. B. View established connectons in the connectons table. C. View the inbound and outbound kernel modules and the order in which they are applied. D. Determine if VPN Security Associatons are being established.
Aoswern C Question 6 The command _____________ shows which frewall chain modules are actve on a gateway. A. fw stat B. fw ctl debug C. fw ctl chain D. fw ctl multk stat
Aoswern C Question 7 The command fw ctl kdebug <params> is used to: A. list enabled debug parameters. B. read the kernel debug bufer to obtain debug messages. C. enable kernel debugging. D. select specifc kernel modules for debugging.
Aoswern B Question 8 Compare these two images to establish which blade/feature was disabled on the frewall.
TestWarrior.com
3
Questions And Answers PDF
A. IPS B. VPN C. NAT D. L2TP
Aoswern B Question 9 What command would give you a summary of all the tables available to the frewall kerneln A. fw tab B. fw tab -s C. fw tab -h D. fw tab -o
Aoswern B Question 10 What fag opton(s) must be used to dump the complete table in friendly format, assuming there are more than one hundred connectons in the tablen A. fw tab -t connectons -f B. fw tab -t connect -f -u C. fw tab -t connectons -s D. fw tab -t connectons -f â&#x20AC;&#x201C;u
Aoswern B
TestWarrior.com
4
Questions And Answers PDF
Question 11 Which directory below contains the URL Filtering engine update infon Here you can also go to see the status of the URL Filtering and Applicaton Control updates. A. $FWDIR/urlf/update B. $FWDIR/appi/update C. $FWDIR/appi/urlf D. $FWDIR/update/appi
Aoswern B Question 12 For URL Filtering in the Cloud in R75 and above, what table is used to contain the URL Filtering cache valuesn A. urlf_blade_on_gw B. urlf_cache_tbl C. urlf_cache_table D. url_scheme_tab
Aoswern C Question 13 You are troubleshootng a Security Gateway, atemptng to determine which chain is causing a problem. What command would you use to show all the chains through which trafc passedn A. [Expert@HostName]# fw ctl chain B. [Expert@HostName]# fw monitor -e "accept;" -p all C. [Expert@HostName]# fw ctl debug â&#x20AC;&#x201C;m D. [Expert@HostName]# fw ctl zdebug all
Aoswern B Question 14 True or False: Sofware blades perform their inspecton primarily through the kernel chain modules. A. False. Sofware blades do not pass through the chain modules. B. True. Many sofware blades have their own dedicated kernel chain module for inspecton. C. True. All sofware blades are inspected by the IP Optons chain module. D. True. Most sofware blades are inspected by the TCP streaming or Passive Streaming chain module.
Aoswern B
TestWarrior.com
5
Questions And Answers PDF
Question 15 When using the command fw monitor, what command ensures the capture is accuraten A. export TDERROR_ALL_ALL=5 B. fwaccel of C. fwaccel on D. fw accel of
Aoswern B
TestWarrior.com
6
Questions And Answers PDF
Thank You for Trying Our Product Visit Our Site to Purchase the Full Set of Actual 156-115.77 Exam Questions With Answers.
http://www.TestWarrior.com/156-115.77-practice-exam.html We Also Provide Practice Exam Software That Simulates Real Exam Environment And Has Many Self-Assessment Features. Download Free Product Demo From:
Download Free Product Demo from: http://www.TestWarrior.com/156-115.77-practice-exam.html
Check Out Our Customer Testimonials
TestWarrior.com
7