Month End Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Note! Following 156-115.77 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

156-115.77 Exam Dumps - Check Point Certified Security Master

Go to page:
Question # 33

John is a Security Administrator of a Check Point platform. He has a mis-configuration issue that points to the Rule Base. To obtain information about the issue, John runs the command:

A.

fw debug fw on and checks the file fwm.elg.

B.

fw kdebug fwm on and checks the file fwm.elg.

C.

fw debug fwm on and checks the file fwm.elg.

D.

fw kdebug fwm on and checks the file fw.elg.

Full Access
Question # 34

Which process should you debug when SmartDashboard authentication is rejected?

A.

fwm

B.

cpd

C.

fwd

D.

DAService

Full Access
Question # 35

In IKEView while troubleshooting a VPN issue between your gateway and a partner site you see an entry that states “Invalid ID”. Which of the following is the most likely cause?

A.

IKEv1 is not supported by the peer.

B.

Time is not matching between two members.

C.

The encryption parameters (hash, encryption type, etc.) do not match.

D.

Wrong subnets are being negotiated.

Full Access
Question # 36

What command should a firewall administrator use to begin debugging SecureXL?

A.

fwaccel dbg api + verbose add

B.

fwaccel debug –m

C.

fwaccel dbg -m

D.

SecureXL cannot be dubugged and the kernel debug will give enough output to help the firewall administrator to understand the firewalls behaviour. The right command to use is fw ctl debug –m fw.

Full Access
Question # 37

Look at the follow Rule Base display. Rule 5 contains a TIME object. What is the effect on the following rules?

A.

Rule 6 will be eligible but Rule 7 will not.

B.

All subsequent rules below Rule 5 will not be templated, regardless of the rule

C.

No effect. Rules 6 and 7 will be eligible for templating.

D.

The restriction on one rule does not affect later rules with regards to templates.

Full Access
Question # 38

What command can be used to get the following output?

A.

fw ctl kdebug

B.

fw monitor –e “accept;”

C.

fwaccel conns

D.

netstat -ni

Full Access
Question # 39

SecureXL uses templating to accelerate traffic passing through the gateway. What command should you run to determine if Accept, Drop and NAT templating is enabled?

A.

fwaccel stat

B.

fw ctl pstat

C.

cphaprob -a if

D.

cpconfig

Full Access
Question # 40

A system administrator wants to convert an IPv6 gateway from a standard gateway into a gateway running VSX mode. What does he need to consider?

A.

It is not possible to convert a gateway with IPv6 enabled to VSX mode.

B.

There needs to be proper IPv6 routing setup.

C.

At least two interfaces need to be configured with IPv6.

D.

Policy needs to be properly applied to the gateway before converting the system to VSX mode.

Full Access
Go to page: