Check Point 156-115.80 Check Point Certified Security Master – R80 Online Training
Check Point 156-115.80 Online Training
The questions for 156-115.80 were last updated at Feb 18,2025.
- Exam Code: 156-115.80
- Exam Name: Check Point Certified Security Master - R80
- Certification Provider: Check Point
- Latest update: Feb 18,2025
Which is the correct “fw monitor” syntax for creating a capture file for loading it into WireShark?
- A . fw monitor Ce “accept <FILTER EXPRESSION>; “>> Output.cap
- B . This cannot be accomplished as it is not supported with R80.10
- C . fw monitor Ce “accept <FILTER EXPRESSION>;” Cfile Output.cap
- D . fw monitor Ce “accept <FILTER EXPRESSION>;” Co Output.cap
How many layers are incorporated in IPS detection and what are they called?
- A . 4 layers C Passive Streaming Library (PSL), Protocol Parsers, Context Management, Protections
- B . 3 layers C Active Streaming Library (ASL), CMI, Protections
- C . 4 layers C Active Streaming Library (ASL), Protocol Parsers, Context Management, Protections
- D . 3 layers C Protocol Parsers, CMI, Protections
What is the command to check the current status of hyper-threading?
- A . fw ctl get int cphwd_hyper_status
- B . fw ctl multik stat
- C . cat/proc/hyperstats
- D . cat/proc/smt_status
What occurs when Bypass Under Load activated?
- A . Packets are forwarded to the destination without checking the packets against the firewall rule base
- B . Packets are forwarded to the destination without performing IPS analysis
- C . To still ensure a minimum level of data integrity, the system revert to the use of MD5 instead of SHA-1, since former produces an output smaller than the latter
- D . The amount of the state table entries is decreased according to the LRU (least recently used) algorithm
Having a look at the output of the “fwaccel conns” command, the F flag is the indicator for a packet ______________.
- A . getting the routing information according to the Forwarding Information Base (FIB)
- B . being processed by the firewall kernel module
- C . going through the slow path
- D . being forced of using the accelerated path
Of how many packets consists Main Mode in Phase 1?
- A . Three packets
- B . Four packets
- C . Six packets
- D . it depends on the encryption algorithm used. 3DES has three times more packets than DES encryption
What does the command “vpn shell tunnels delete all ike” do?
- A . Delete only outbound_SPI tables
- B . Deletes all IKE and IPSEC SA’s
- C . Deletes all IKE configuration on the Gateway
- D . Deletes all IKE SA’s
When enabling hyper-threading on a Security Gateway, the administrator needs to make sure there is enough _______________ to support additional CoreXL Firewall instances.
- A . drive space
- B . cpu’s
- C . available cache
- D . available memory
You run “cat/proc/smt_status” on your security gateway and the output shows ‘Soft Disable’.
How is your system configured in reference to hyper-threading?
- A . Hyper-threading is disabled in BIOS and cpconfig
- B . Hyper-threading is enabled in BIOS but disabled in cpconfig
- C . Hyper-threading is disabled in BIOS but enabled in cpconfig
- D . Your system does not support Hyper-threading
Which command is used to enable IPv6 on Security Gateway?
- A . set ipv6-state on
- B . add ipv6 interface on
- C . set ipv6-enable on
- D . set ipv6-state enabled