Black Friday Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Note! Following 156-115.77 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

156-115.77 Exam Dumps - Check Point Certified Security Master

Question # 4

By default, the size of the fwx_alloc table is:

A.

65535

B.

65536

C.

25000

D.

1024

Full Access
Question # 5

Server A is subject to automatically static NAT and also resides on a network which is subject to automatic Hide NAT. With regards to address translation what will happen when Server A initiates outbound communication?

A.

This will cause a policy verification error.

B.

This is called hairpin NAT, the traffic will return to the server.

C.

The static NAT will take precedence.

D.

The Hide NAT will take precedence.

Full Access
Question # 6

What considerations are required when configuring IPV6 with Wire mode?

A.

IPv6 in Wire mode is only supported in R77.

B.

IPV6 must be configured on both end points.

C.

IPV6 is not supported in Wire mode.

D.

You must use internal IPv6 addressing space to use Wire mode.

Full Access
Question # 7

Which feature is not supported with unnumbered VTI?

A.

Proxy interfaces

B.

High availability

C.

Policy based routing

D.

Anti-spoofing

Full Access
Question # 8

In Wire mode. if a packet reaches the gateway from a trusted source and is destined to a trusted destination, will the firewall do stateful inspection?

A.

No, but IPS inspection will still be enforced.

B.

Yes, the Firewall always performs stateful inspection.

C.

Yes, but only if SecureXL is disabled.

D.

No

Full Access
Question # 9

You are configuring OSPF on your Secure Platform firewall. You are in expert mode and run the commands:

interface vt-Gateway_C

IP ospf 1 area 0.0.0.0

exit

When you run show running-config you do not see your OSPF configuration listed Why?

A.

You did not run command save running config before you exited.

B.

You should not have moved to expert mode to make these configurations.

C.

You did not run command save configuration before you exited.

D.

You did not run command enable before you exited.

Full Access
Question # 10

After disabling SecureXL you ran command fw monitor to help troubleshoot a VPN issue. In your review you note that you only see pre-inbound traffic (“i”) and no other traffic after this. Which of the following reasons could explain this output?

A.

You don’t have an “encrypt” rule

B.

Traffic is not destined to the correct MAC address because you failed to set up proxy ARP

C.

You have overlapping encryption domains with the remote site

D.

Routes are set up incorrectly

Full Access
Question # 11

You are setting up VPN between two gateways Local-GW and New-GW and want to use shared secret. For some reason New-GW is not showing up in the shared secret properties under mesh community properties. What is the most likely reason why the New-GW is not displayed?

A.

Gateway is locally managed by the same management station as Local-GW and shared secret is not supported for this configuration

B.

New-GW has to have Advanced properties > shared secret enabled.

C.

You need to install database by selecting Policy > Install database before gateway can be added.

D.

Gateway is 600 appliance and does not support “shared secret” option.

Full Access
Question # 12

What command allows you to monitor IPV6 packets in the kernel module?

A.

ip -6 neigh show

B.

ip -6 addr show

C.

tcpdump -nni eth ip6

D.

fw6 monitor

Full Access
Question # 13

Which of these commands can be used to display the IPv6 status?

A.

show ipv6-stat

B.

show ipv6 all

C.

show ipv6 status

D.

show ipv6-status

Full Access
Question # 14

How do you disable IPv6 on an IPSO gateway?

A.

Run $FWDIR/scripts/fwipv6_enable off and reboot.

B.

Remove the IPv6 license from the gateway.

C.

You cannot disable IPv6.

D.

In IPSO go to System Management > System Configuration, set IPv6 Support to off, and click Apply.

Full Access
Question # 15

The CoreXL software architecture includes the Secure Network Dispatcher (SND). One of the responsibilities of SND is to:

A.

Distribute non-accelerated packets among kernel instances

B.

Dispatch the packet securely through the VPN link

C.

Processing outgoing traffic from the network interfaces

D.

Dispatch the packet securely through the physical link

Full Access
Question # 16

CoreXL on IPSO R77.20 does NOT support which of the following features?

A.

Check Point QoS

B.

IPv6

C.

Overlapping NAT

D.

Route-based VPN

Full Access
Question # 17

What is the method to change the number of cores that CoreXL will use?

A.

cpconfig

B.

SmartDashboard

C.

sysconfig

D.

CoreXL automatically recognizes the number of cores on a system at startup so there is no method or reason to modify the setting.

Full Access
Question # 18

What does “cphwd_nat_templates_enabled=1” do when entered into fwkern.conf?

A.

Disables NAT templates when SecureXL is turned on.

B.

Enables NAT templates when SecureXL is turned on.

C.

Enables NAT templates at all times.

D.

Disables NAT templates at all times.

Full Access
Question # 19

What command would you use to check if CoreXL is enabled?

A.

fw ctl multik stat

B.

cpconfig

C.

fw ctl affinity -1

D.

fw ctl pstat

Full Access
Question # 20

How would you determine the value of 'Maximum concurrent connections' of the NAT Table?

A.

fwx_alloc

B.

fwx_max_conns

C.

fwx_auth

D.

objects_5_0.C

Full Access
Question # 21

If the number of Firewall Workers for CoreXL is set higher on one member of a cluster than the other, the cluster will be in what state?

A.

Active/Standby

B.

Active/Ready

C.

Active Attention/Down

D.

Active/Down

Full Access
Question # 22

Which command will NOT display information related to memory usage?

A.

free

B.

fw ctl pstat

C.

cat /proc/meminfo

D.

memoryinfo.conf

Full Access
Question # 23

In a ClusterXL cluster with delayed synchronization, which of the following is not true?

A.

The length of time for the delay can be edited.

B.

It applies only to TCP services whose Protocol Type is set to HTTP or None.

C.

Delayed Synchronization is disabled if the Track option in the rule is set to Log or Account.

D.

Delayed Synchronization is performed only for connections matching a SecureXL Connection Template.

Full Access
Question # 24

What type of connections cannot be templated?

A.

Any connections that contain Hide NAT

B.

Complex connections such as FTP, H323, SQL, ETC

C.

UDP because it is not connection oriented

D.

TCP

Full Access
Question # 25

What will be the outcome if you set the kernel parameters cphwd_nat_templates_enabled and cphwd_nat_templates_support?

A.

This would enable Hide NAT support.

B.

These parameters are mutually exclusive and cannot be used at the same time.

C.

This would enable SecureXL NAT templates.

D.

These are not valid parameters.

Full Access
Question # 26

Your gateway object is currently defined with a max connection count of 25k connections in Smart Dashboard. Which of the following commands would show you the current and peak connection counts?

A.

show connections all

B.

fw ctl conn

C.

fw ctl chain

D.

fw ctl pstat

Full Access
Question # 27

What would be considered Best Practice to determine which IPS protections you can safely disable for your environment?

A.

You should use vulnerability tools to perform an assessment of your environment.

B.

Work through turning on each protection to see which signatures get alerts.

C.

You should set all protections to “Detect”.

D.

You should not disable any IPS protections.

Full Access
Question # 28

When performing a Clean IPS procedure to resolve a corrupt IPS files issue, what file is modified in order for the SDUU process to automatically update the IPS files after completing the procedure?

A.

asm.C

B.

inspect.C

C.

objects_5_0.C

D.

profiles.C

Full Access
Question # 29

SNORT is a popular open source IDS, you would like to import SNORT rules from plain text into Check Point Smart Center. How can you accomplish this?

A.

Under the IPS tree Protections > By Protocol > IPS Software Blade > Application Intelligence > SNORT import and select the SNORT import option.

B.

IPS profiles must be manually configured on each gateway.

C.

Check Point does not support third party signatures.

D.

From the command line, run: ips_export_import import -f [-p ].

Full Access
Question # 30

When the IPS ‘Bypass under Load’ mechanism detects that the certain CPU and memory usage thresholds have been reached, which of the following occurs?

A.

The mechanism configures all IPS protections in ‘Detect Mode’

B.

IPS is disabled completely

C.

The mechanism disables all IPS protections by placing them under ‘exception’

D.

Stateful Inspection is disabled

Full Access
Question # 31

What command would you use for a packet capture on an absolute position for TCP streaming (out) 1ffffe0

A.

fw ctl chain -po 1ffffe0 -o monitor.out

B.

fw monitor -po -0x1ffffe0 -o monitor.out

C.

fw monitor -e 0x1ffffe0 -o monitor.out

D.

fw monitor -pr 1ffffe0 -o monitor.out

Full Access
Question # 32

When using the command fw monitor, what command ensures the capture is accurate?

A.

export TDERROR_ALL_ALL=5

B.

fwaccel off

C.

fwaccel on

D.

fw accel off

Full Access
Question # 33

John is a Security Administrator of a Check Point platform. He has a mis-configuration issue that points to the Rule Base. To obtain information about the issue, John runs the command:

A.

fw debug fw on and checks the file fwm.elg.

B.

fw kdebug fwm on and checks the file fwm.elg.

C.

fw debug fwm on and checks the file fwm.elg.

D.

fw kdebug fwm on and checks the file fw.elg.

Full Access
Question # 34

Which process should you debug when SmartDashboard authentication is rejected?

A.

fwm

B.

cpd

C.

fwd

D.

DAService

Full Access
Question # 35

In IKEView while troubleshooting a VPN issue between your gateway and a partner site you see an entry that states “Invalid ID”. Which of the following is the most likely cause?

A.

IKEv1 is not supported by the peer.

B.

Time is not matching between two members.

C.

The encryption parameters (hash, encryption type, etc.) do not match.

D.

Wrong subnets are being negotiated.

Full Access
Question # 36

What command should a firewall administrator use to begin debugging SecureXL?

A.

fwaccel dbg api + verbose add

B.

fwaccel debug –m

C.

fwaccel dbg -m

D.

SecureXL cannot be dubugged and the kernel debug will give enough output to help the firewall administrator to understand the firewalls behaviour. The right command to use is fw ctl debug –m fw.

Full Access
Question # 37

Look at the follow Rule Base display. Rule 5 contains a TIME object. What is the effect on the following rules?

A.

Rule 6 will be eligible but Rule 7 will not.

B.

All subsequent rules below Rule 5 will not be templated, regardless of the rule

C.

No effect. Rules 6 and 7 will be eligible for templating.

D.

The restriction on one rule does not affect later rules with regards to templates.

Full Access
Question # 38

What command can be used to get the following output?

A.

fw ctl kdebug

B.

fw monitor –e “accept;”

C.

fwaccel conns

D.

netstat -ni

Full Access
Question # 39

SecureXL uses templating to accelerate traffic passing through the gateway. What command should you run to determine if Accept, Drop and NAT templating is enabled?

A.

fwaccel stat

B.

fw ctl pstat

C.

cphaprob -a if

D.

cpconfig

Full Access
Question # 40

A system administrator wants to convert an IPv6 gateway from a standard gateway into a gateway running VSX mode. What does he need to consider?

A.

It is not possible to convert a gateway with IPv6 enabled to VSX mode.

B.

There needs to be proper IPv6 routing setup.

C.

At least two interfaces need to be configured with IPv6.

D.

Policy needs to be properly applied to the gateway before converting the system to VSX mode.

Full Access
Question # 41

What would be a reason to use the command cphaosu stat?

A.

To determine the number of connections from OPSEC software using Open Source Licenses.

B.

To decide when to fail over traffic to a new cluster member.

C.

This is not a valid command.

D.

To see the policy install dates on each of the members in the cluster.

Full Access
Question # 42

How do you clear the connections table?

A.

Run the command fw tab –t connections –x

B.

In Gateway Properties > Optimizations click Clear connections table

C.

Run the command fw tab –t conns –c

D.

Run the command fw tab –t connections –c

Full Access
Question # 43

When viewing connections using the command fw tab -t connections, all entries are displayed with a 6-tuple key, the elements of the 6-tuple include the following EXCEPT:

A.

destination port number

B.

source port number

C.

direction (inbound / outbound)

D.

interface id

Full Access
Question # 44

How do you set up Port Address Translation?

A.

Since Hide NAT changes to random high ports it is by definition PAT (Port Address Translation).

B.

Create a manual NAT rule and specify the source and destination ports.

C.

Edit the service in SmartDashboard, click on the NAT tab and specify the translated port.

D.

Port Address Translation is not support in Check Point environment

Full Access