Checkpoint 156-115.77 - Check Point Certified Security Master Exam
Page: 1 / 59
Total 295 questions
Question #1 (Topic: Topic 1)
When troubleshooting and trying to understand which chain is causing a problem on the
Security Gateway, you should use the command:
Security Gateway, you should use the command:
A. fw ctl zdebug drop
B. fw tab –t connections
C. fw monitor -e "accept;" -p all
D. fw ctl chain
Answer: C
Question #2 (Topic: Topic 1)
True or False: Software blades perform their inspection primarily through the kernel chain
modules.
modules.
A. False. Software blades do not pass through the chain modules.
B. True. Many software blades have their own dedicated kernel chain module for inspection.
C. True. All software blades are inspected by the IP Options chain module.
D. True. Most software blades are inspected by the TCP streaming or Passive Streaming chain module.
Answer: B
Question #3 (Topic: Topic 1)
Which of the following BEST describes the command fw ctl chain function?
A. View how CoreXL is distributing traffic among the firewall kernel instances.
B. View established connections in the connections table.
C. View the inbound and outbound kernel modules and the order in which they are applied.
D. Determine if VPN Security Associations are being established.
Answer: C
Question #4 (Topic: Topic 1)
When using the command fw monitor, what command ensures the capture is accurate?
A. export TDERROR_ALL_ALL=5
B. fwaccel off
C. fwaccel on
D. fw accel off
Answer: B
Question #5 (Topic: Topic 1)
What flag option(s) must be used to dump the complete table in friendly format, assuming
there are more than one hundred connections in the table?
there are more than one hundred connections in the table?
A. fw tab -t connections -f
B. fw tab -t connect -f -u
C. fw tab -t connections -s
D. fw tab -t connections -f –u
Answer: B