Cyber Monday Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

Note! 156-115.80 has been withdrawn.

Practice Free 156-115.80 Check Point Certified Security Master - R80 Exam Questions Answers With Explanation

We at Crack4sure are committed to giving students who are preparing for the Checkpoint 156-115.80 Exam the most current and reliable questions . To help people study, we've made some of our Check Point Certified Security Master - R80 exam materials available for free to everyone. You can take the Free 156-115.80 Practice Test as many times as you want. The answers to the practice questions are given, and each answer is explained.

Question # 6

The packet processing infrastructure consists of 4 components. Which component contains the CLOB, the object that contains information about the packet that is needed to make security decisions?

A.

Classifiers

B.

Handlers

C.

Manager

D.

Observers

Question # 7

When dealing with monolithic operating systems such as Gaia, where are system calls initiated from to achieve a required system level function?

A.

Slow Path

B.

Medium Path

C.

Kernel Mode

D.

User Mode

Question # 8

How would you disable CPM debug?

A.

Run fw debug cpm off TDERROR_ALL_ALL=0

B.

Delete $FWDIR/log/tdlog.cpm file

C.

Set the severity level to INFO and run cpm_debug.sh –r

D.

Delete $FWDIR/log/fwm.elg file

Question # 9

Which of the following features is supported in Check Point’s implementation of IPv6?

A.

Security Servers

B.

QoS

C.

ClusterXL High Availability

D.

SAM

Question # 10

Which command(s) can be used to set up 5 core files per process?

A.

set core-dump per_process 5 save config

B.

set core-dump per_process amount = 5 save config

C.

set core-dump per_process 5

D.

add core-dump per_process 5 save config

Question # 11

Which of the following is not one of the relational database domains that stores the management configuration?

A.

User Domain

B.

System Domain

C.

Global Domain

D.

Audit Domain

Question # 12

Which daemon process performs asymmetric key operations for HTTPS Inspection?

A.

httpsd

B.

httpkd

C.

wstlsd

D.

pkxld

Question # 13

The security administrator wants to verify if a specific connection is being handling by SecureXL. What command below is used to verify this information?

A.

fwaccel conns

B.

fwaccel stat

C.

cpview

D.

fw tab –t connections –f | grep

Question # 14

Why should you run “clusterXL_admin down –p” command?

A.

You want to keep the peers in sync during the failover testing

B.

This option is required with clusterXL_admin command

C.

With the –p option, monitoring of critical devices will continue

D.

This option allows automatic failover if the active member experiences a problem

Question # 15

When running a debug with fw monitor, which parameter will create a more verbose output?

A.

-l

B.

-i

C.

-D

D.

-d

Question # 16

You run “cat/proc/smt_status” on your security gateway and the output shows ‘Soft Disable’. How is your system configured in reference to hyper-threading?

A.

Hyper-threading is disabled in BIOS and cpconfig

B.

Hyper-threading is enabled in BIOS but disabled in cpconfig

C.

Hyper-threading is disabled in BIOS but enabled in cpconfig

D.

Your system does not support Hyper-threading

Question # 17

What is the correct syntax for firewall monitor to output to standard out?

A.

fw mon

B.

fw monitor > std_out

C.

fw monitor

D.

fw monitor –out

Question # 18

The customer is using Check Point appliances that were configured long ago by third-party administrators. Current policy includes different enabled IPS protections and Bypass Under Load function. Bypass Under Load is configured to disable IPS inspections if CPU and Memory usage is higher than 80%. The Customer reports that IPS protections are not working at all regardless of CPU and Memory usage. What is a possible reason of such behavior?

A.

The kernel parameter ids_assume_stress is set to 0

B.

The kernel parameter ids_assume_stress is set to 1

C.

The kernel parameter ids_tolerance_no_stress is set to 10

D.

The kernel parameter ids_tolerance_stress is set to 10

Question # 19

Which command would you use to check CoreXL instances for IPv6 traffic?

A.

fwaccel6 stats

B.

fwaccel6 stat

C.

fw ctl multik stat

D.

fw6ctl multik stat

Question # 20

Which command would show the synchronization statistics between cluster members?

A.

cphaprob stat

B.

fw ctl sync

C.

fw ctl pstat

D.

cphaprob sync

Question # 21

What occurs when Bypass Under Load activated?

A.

Packets are forwarded to the destination without checking the packets against the firewall rule base

B.

Packets are forwarded to the destination without performing IPS analysis

C.

To still ensure a minimum level of data integrity, the system revert to the use of MD5 instead of SHA-1, since former produces an output smaller than the latter

D.

The amount of the state table entries is decreased according to the LRU (least recently used) algorithm

Question # 22

Which command will register the host_monitor device and checks end-to-end connectivity to routers and other network devices?

A.

clusterXL_monitor_ips

B.

clusterXL_monitor_admin

C.

clusterXL_monitor_process

D.

clusterXL_admin

Question # 23

Which one of the following does not belong to an initial status of a critical device?

A.

restart

B.

problem

C.

init

D.

ok