Check Point 156-915.77 Check Point Certified Security Expert Update Blade Online Training
Check Point 156-915.77 Online Training
The questions for 156-915.77 were last updated at Nov 23,2024.
- Exam Code: 156-915.77
- Exam Name: Check Point Certified Security Expert Update Blade
- Certification Provider: Check Point
- Latest update: Nov 23,2024
Which command would you use to save the interface information before upgrading a Windows Gateway?
- A . cp /etc/sysconfig/network.C [location]
- B . ipconfig Ca > [filename].txt
- C . ifconfig > [filename].txt
- D . netstat Crn > [filename].txt
When upgrading a cluster in Full Connectivity Mode, the first thing you must do is see if all cluster members have the same products installed.
Which command should you run?
- A . fw fcu
- B . cphaprob fcustat
- C . cpconfig
- D . fw ctl conn Ca
A Minimal Effort Upgrade of a cluster:
- A . Is only supported in major releases (R70 to R71, R71 to R76).
- B . Is not a valid upgrade method in R76.
- C . Treats each individual cluster member as an individual gateway.
- D . Upgrades all cluster members except one at the same time.
A Zero Downtime Upgrade of a cluster:
- A . Upgrades all cluster members except one at the same time.
- B . Is only supported in major releases (R70 to R71, R71 to R76).
- C . Treats each individual cluster member as an individual gateway.
- D . Is not a valid upgrade method in R76.
A Full Connectivity Upgrade of a cluster:
- A . Treats each individual cluster member as an individual gateway.
- B . Upgrades all cluster members except one at the same time.
- C . Is only supported in minor version upgrades (R70 to R71, R71 to R76).
- D . Is not a valid upgrade method in R76.
A Fast Path Upgrade of a cluster:
- A . Upgrades all cluster members except one at the same time.
- B . Treats each individual cluster member as an individual gateway.
- C . Is not a valid upgrade method in R76.
- D . Is only supported in major releases (R70 to R71, R75 to R76).
How does Check Point recommend that you secure the sync interface between gateways?
- A . Configure the sync network to operate within the DMZ.
- B . Secure each sync interface in a cluster with Endpoint.
- C . Use a dedicated sync network.
- D . Encrypt all sync traffic between cluster members.
How would you set the debug buffer size to 1024?
- A . Run fw ctl set buf 1024
- B . Run fw ctl kdebug 1024
- C . Run fw ctl debug -buf 1024
- D . Run fw ctl set int print_cons 1024
Steve is troubleshooting a connection problem with an internal application.
If he knows the source IP address is 192.168.4.125, how could he filter this traffic?
- A . Run fw monitor -e "accept dsrc=192.168.4.125;"
- B . Run fw monitor -e "accept dst=192.168.4.125;"
- C . Run fw monitor -e "accept ip=192.168.4.125;"
- D . Run fw monitor -e "accept src=192.168.4.125;"
Check Point support has asked Tony for a firewall capture of accepted packets.
What would be the correct syntax to create a capture file to a filename called monitor. out?
- A . Run fw monitor -e "accept;" -f monitor.out
- B . Run fw monitor -e "accept;" -c monitor.out
- C . Run fw monitor -e "accept;" -o monitor.out
- D . Run fw monitor -e "accept;" -m monitor.out