Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

Note! 156-115.80 has been withdrawn.

156-115.80 Practice Exam Questions with Answers Check Point Certified Security Master - R80 Certification

Question # 6

The packet processing infrastructure consists of 4 components. Which component contains the CLOB, the object that contains information about the packet that is needed to make security decisions?

A.

Classifiers

B.

Handlers

C.

Manager

D.

Observers

Full Access
Question # 7

When dealing with monolithic operating systems such as Gaia, where are system calls initiated from to achieve a required system level function?

A.

Slow Path

B.

Medium Path

C.

Kernel Mode

D.

User Mode

Full Access
Question # 8

How would you disable CPM debug?

A.

Run fw debug cpm off TDERROR_ALL_ALL=0

B.

Delete $FWDIR/log/tdlog.cpm file

C.

Set the severity level to INFO and run cpm_debug.sh –r

D.

Delete $FWDIR/log/fwm.elg file

Full Access
Question # 9

Which of the following features is supported in Check Point’s implementation of IPv6?

A.

Security Servers

B.

QoS

C.

ClusterXL High Availability

D.

SAM

Full Access
Question # 10

Which command(s) can be used to set up 5 core files per process?

A.

set core-dump per_process 5 save config

B.

set core-dump per_process amount = 5 save config

C.

set core-dump per_process 5

D.

add core-dump per_process 5 save config

Full Access
Question # 11

Which of the following is not one of the relational database domains that stores the management configuration?

A.

User Domain

B.

System Domain

C.

Global Domain

D.

Audit Domain

Full Access
Question # 12

Which daemon process performs asymmetric key operations for HTTPS Inspection?

A.

httpsd

B.

httpkd

C.

wstlsd

D.

pkxld

Full Access
Question # 13

The security administrator wants to verify if a specific connection is being handling by SecureXL. What command below is used to verify this information?

A.

fwaccel conns

B.

fwaccel stat

C.

cpview

D.

fw tab –t connections –f | grep

Full Access
Question # 14

Why should you run “clusterXL_admin down –p” command?

A.

You want to keep the peers in sync during the failover testing

B.

This option is required with clusterXL_admin command

C.

With the –p option, monitoring of critical devices will continue

D.

This option allows automatic failover if the active member experiences a problem

Full Access
Question # 15

When running a debug with fw monitor, which parameter will create a more verbose output?

A.

-l

B.

-i

C.

-D

D.

-d

Full Access
Question # 16

You run “cat/proc/smt_status” on your security gateway and the output shows ‘Soft Disable’. How is your system configured in reference to hyper-threading?

A.

Hyper-threading is disabled in BIOS and cpconfig

B.

Hyper-threading is enabled in BIOS but disabled in cpconfig

C.

Hyper-threading is disabled in BIOS but enabled in cpconfig

D.

Your system does not support Hyper-threading

Full Access
Question # 17

What is the correct syntax for firewall monitor to output to standard out?

A.

fw mon

B.

fw monitor > std_out

C.

fw monitor

D.

fw monitor –out

Full Access
Question # 18

The customer is using Check Point appliances that were configured long ago by third-party administrators. Current policy includes different enabled IPS protections and Bypass Under Load function. Bypass Under Load is configured to disable IPS inspections if CPU and Memory usage is higher than 80%. The Customer reports that IPS protections are not working at all regardless of CPU and Memory usage. What is a possible reason of such behavior?

A.

The kernel parameter ids_assume_stress is set to 0

B.

The kernel parameter ids_assume_stress is set to 1

C.

The kernel parameter ids_tolerance_no_stress is set to 10

D.

The kernel parameter ids_tolerance_stress is set to 10

Full Access
Question # 19

Which command would you use to check CoreXL instances for IPv6 traffic?

A.

fwaccel6 stats

B.

fwaccel6 stat

C.

fw ctl multik stat

D.

fw6ctl multik stat

Full Access
Question # 20

Which command would show the synchronization statistics between cluster members?

A.

cphaprob stat

B.

fw ctl sync

C.

fw ctl pstat

D.

cphaprob sync

Full Access
Question # 21

What occurs when Bypass Under Load activated?

A.

Packets are forwarded to the destination without checking the packets against the firewall rule base

B.

Packets are forwarded to the destination without performing IPS analysis

C.

To still ensure a minimum level of data integrity, the system revert to the use of MD5 instead of SHA-1, since former produces an output smaller than the latter

D.

The amount of the state table entries is decreased according to the LRU (least recently used) algorithm

Full Access
Question # 22

Which command will register the host_monitor device and checks end-to-end connectivity to routers and other network devices?

A.

clusterXL_monitor_ips

B.

clusterXL_monitor_admin

C.

clusterXL_monitor_process

D.

clusterXL_admin

Full Access
Question # 23

Which one of the following does not belong to an initial status of a critical device?

A.

restart

B.

problem

C.

init

D.

ok

Full Access