Checkpoint 156-115.77 - Check Point Certified Security Master Exam

Page:    1 / 59   
Total 295 questions

When troubleshooting and trying to understand which chain is causing a problem on the
Security Gateway, you should use the command:

  • A. fw ctl zdebug drop
  • B. fw tab –t connections
  • C. fw monitor -e "accept;" -p all
  • D. fw ctl chain


Answer : C

True or False: Software blades perform their inspection primarily through the kernel chain modules.

  • A. False. Software blades do not pass through the chain modules.
  • B. True. Many software blades have their own dedicated kernel chain module for inspection.
  • C. True. All software blades are inspected by the IP Options chain module.
  • D. True. Most software blades are inspected by the TCP streaming or Passive Streaming chain module.


Answer : B

Which of the following BEST describes the command fw ctl chain function?

  • A. View how CoreXL is distributing traffic among the firewall kernel instances.
  • B. View established connections in the connections table.
  • C. View the inbound and outbound kernel modules and the order in which they are applied.
  • D. Determine if VPN Security Associations are being established.


Answer : C

When using the command fw monitor, what command ensures the capture is accurate?

  • A. export TDERROR_ALL_ALL=5
  • B. fwaccel off
  • C. fwaccel on
  • D. fw accel off


Answer : B

Explanation:

C1O2 - Chain Modules -

What flag option(s) must be used to dump the complete table in friendly format, assuming there are more than one hundred connections in the table?

  • A. fw tab -t connections -f
  • B. fw tab -t connect -f -u
  • C. fw tab -t connections -s
  • D. fw tab -t connections -f –u


Answer : B

Page:    1 / 59   
Total 295 questions