Check Point 156-115.80 Check Point Certified Security Master – R80 Online Training
Check Point 156-115.80 Online Training
The questions for 156-115.80 were last updated at Feb 19,2025.
- Exam Code: 156-115.80
- Exam Name: Check Point Certified Security Master - R80
- Certification Provider: Check Point
- Latest update: Feb 19,2025
What is the correct command to turn off an IKE debug?
- A . vpn debug ikeoff
- B . fw ctl debug ikeoff
- C . vpn debug ikeoff 0
- D . fw ctl vpn debug ikeoff
What process(es) should be checked if there is high I/O and you suspect it may be related to the Antivirus Software Blade?
- A . avsp
- B . dlpu and rad processes
- C . cpta
- D . cpm and fwm
Which of the following is NOT a special consideration while running fw monitor on production firewall?
- A . While executing fw monitor, you need to specify an expression so that it captures the required traffic instead of all traffic
- B . While running fw monitor on a busy firewall, the Cci <count> and Cco <count> switches can be used to limit the number of packets captured
- C . While running fw monitor, it resets all the debug flags
- D . During a fw monitor, the firewall will have to process more packets because SecureXL acceleration should be disabled
In R80 spoofing is defined as a method of:
- A . Disguising an illegal IP address behind an authorized IP address through Port Address Translation
- B . Hiding your firewall from unauthorized users
- C . Detecting people using false or wrong authentication logins
- D . Making packets appear as if they come an authorized IP address
Which of the following inputs is suitable for debugging HTTPS inspection issues?
- A . vpn debug cptls on
- B . fw ctl debug Cm fw + conn drop cptls
- C . fw diag debug tls enable
- D . fw debug tls on TDERROR_ALL_ALL=5
Which of the connections cannot be accelerated with SecureXL?
- A . Every NAT’ed connection
- B . Every encrypted connection, such as HTTPS or SSH connections
- C . Every connection destined to the Security Gateways
- D . Every connection through a rule using a time object
Which of the following ports are used for SIC?
- A . 18355 and 18356
- B . 18210 and 18211
- C . 257 and 258
- D . 18192 and 18193
Joey’s implementing a new R80.10 firewall cluster into the network. During the implementation he notices that the cluster object is in error state in SmartConsole. He tries to figure out the cause of the problem and runs a ClusterXL kernel debug with command: ‘fw ctl debug Cm cluster + stat pnote conf ccp’ ClusterXL kernel debug shows him following info: fwha_set_new_local_state: Old version HA machines exist around so prevent state change to READY.
How can he solve the problem?
- A . cphaconf cluster_id set <NEW_CLUSTER_ID_VALUE>
- B . cphaprob mmagic
- C . Connect with GuiDBedit Tool to Security Management Server. Go to Table C Network Objects C network_objects. Select the relevant R80.10 Cluster object. Go to Search menu C Find C paste mac_magic. Right-click on the mac_magic the object C select Edit… and change the value to 254. Save changes and install policy.
- D . Connect with GuiDBedit Tool to Security Management Server. Go to Table C Network Objects C network_objects. Select the relevant R80.10 Cluster object. Go to Search menu C Find C paste cluster_magic. Right-click on the cluster_magic the object C select Edit… and change the value between 1 and 253. Save changes and install policy.
Which file would you need to make sure you collect when debugging a VPN that fails to establish that is configured to use IKEv2?
- A . $FWDIR/log/ike2.elg
- B . $FWDIR/log/vpnd.xml.v2
- C . $FWDIR/log/ikev2.xml
- D . $CPDIR/log/ike.elg
What is the name of the table that an administrator would review to investigate a port exhaustion error when using Hide NAT?
- A . dyn_nat_table
- B . connection
- C . nat_dyn_table
- D . fwx_alloc