156-115.77 Exam - Secret To Pass In First Attempt

Page 1

Questions And Answers PDF

CheckPoint 156-115.77 Check Point Certified Security Master

Version: DEMO

http://www.TestWarrior.com/156-115.77-practice-exam.html

FOR 156-115.77 Candidates: We offer Two Products:  1st - We have Practice Tests Software with Actual Exam Questions  2nd - Questions and Answers in PDF Format. Try a Free DEMO of these Exam Products via below Link:

http://www.TestWarrior.com/156-115.77-practice-exam.html

TestWarrior.com

1


Questions And Answers PDF

Question 1 What command would you use for a packet capture on an absolute positon for TCP streaming (out) 1ffef A. fw ctl chain -po 1ffef -o monitor.out B. fw monitor -po -fx1ffef -o monitor.out C. fw monitor -e fx1ffef -o monitor.out D. fw monitor -pr 1ffef -o monitor.out

Aoswern B Question 2 The command fw monitor -p all displays what type of informatonn A. It captures all points of the chain as the packet goes through the frewall kernel. B. This is not a valid command. C. The -p is used to resolve MAC address in the frewall capture. D. It does a frewall monitor capture on all interfaces.

Aoswern A Question 3 What does the IP Optons Strip represent under the fw chain outputn A. IP Optons Strip is not a valid fw chain output. B. The IP Optons Strip removes the IP header of the packet prior to be passed to the other kernel functons. C. The IP Optons Strip copies the header details to forward the details for further IPS inspectons. D. IP Optons Strip is only used when VPN is involved.

Aoswern B Question 4 The command that lists the frewall kernel modules on a Security Gateway is: A. fw list kernel modules B. fw ctl kernel chain C. fw ctl debug -m D. fw list modules

Aoswern C

TestWarrior.com

2


Questions And Answers PDF

Question 5 Which of the following BEST describes the command fw ctl chain functonn A. View how CoreXL is distributng trafc among the frewall kernel instances. B. View established connectons in the connectons table. C. View the inbound and outbound kernel modules and the order in which they are applied. D. Determine if VPN Security Associatons are being established.

Aoswern C Question 6 The command _____________ shows which frewall chain modules are actve on a gateway. A. fw stat B. fw ctl debug C. fw ctl chain D. fw ctl multk stat

Aoswern C Question 7 The command fw ctl kdebug <params> is used to: A. list enabled debug parameters. B. read the kernel debug bufer to obtain debug messages. C. enable kernel debugging. D. select specifc kernel modules for debugging.

Aoswern B Question 8 Compare these two images to establish which blade/feature was disabled on the frewall.

TestWarrior.com

3


Questions And Answers PDF

A. IPS B. VPN C. NAT D. L2TP

Aoswern B Question 9 What command would give you a summary of all the tables available to the frewall kerneln A. fw tab B. fw tab -s C. fw tab -h D. fw tab -o

Aoswern B Question 10 What fag opton(s) must be used to dump the complete table in friendly format, assuming there are more than one hundred connectons in the tablen A. fw tab -t connectons -f B. fw tab -t connect -f -u C. fw tab -t connectons -s D. fw tab -t connectons -f –u

Aoswern B

TestWarrior.com

4


Questions And Answers PDF

Question 11 Which directory below contains the URL Filtering engine update infon Here you can also go to see the status of the URL Filtering and Applicaton Control updates. A. $FWDIR/urlf/update B. $FWDIR/appi/update C. $FWDIR/appi/urlf D. $FWDIR/update/appi

Aoswern B Question 12 For URL Filtering in the Cloud in R75 and above, what table is used to contain the URL Filtering cache valuesn A. urlf_blade_on_gw B. urlf_cache_tbl C. urlf_cache_table D. url_scheme_tab

Aoswern C Question 13 You are troubleshootng a Security Gateway, atemptng to determine which chain is causing a problem. What command would you use to show all the chains through which trafc passedn A. [Expert@HostName]# fw ctl chain B. [Expert@HostName]# fw monitor -e "accept;" -p all C. [Expert@HostName]# fw ctl debug –m D. [Expert@HostName]# fw ctl zdebug all

Aoswern B Question 14 True or False: Sofware blades perform their inspecton primarily through the kernel chain modules. A. False. Sofware blades do not pass through the chain modules. B. True. Many sofware blades have their own dedicated kernel chain module for inspecton. C. True. All sofware blades are inspected by the IP Optons chain module. D. True. Most sofware blades are inspected by the TCP streaming or Passive Streaming chain module.

Aoswern B

TestWarrior.com

5


Questions And Answers PDF

Question 15 When using the command fw monitor, what command ensures the capture is accuraten A. export TDERROR_ALL_ALL=5 B. fwaccel of C. fwaccel on D. fw accel of

Aoswern B

TestWarrior.com

6


Questions And Answers PDF

Thank You for Trying Our Product Visit Our Site to Purchase the Full Set of Actual 156-115.77 Exam Questions With Answers.

http://www.TestWarrior.com/156-115.77-practice-exam.html We Also Provide Practice Exam Software That Simulates Real Exam Environment And Has Many Self-Assessment Features. Download Free Product Demo From:

Download Free Product Demo from: http://www.TestWarrior.com/156-115.77-practice-exam.html

Check Out Our Customer Testimonials

TestWarrior.com

7


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.