Which of the following BEST describes the command fw ctl chain function?
A. View how CoreXL is distributing traffic among the firewall kernel instances.
B. View established connections in the connections table.
C. View the inbound and outbound kernel modules and the order in which they are applied.
D. Determine if VPN Security Associations are being established.
Answer: C
The command _____________ shows which firewall chain modules are active on a gateway.
A. fw stat
B. fw ctl debug
C. fw ctl chain
D. fw ctl multik stat
Answer: C
156-115.77 Check Point Certified Security Master
Monday, 2 March 2020
Wednesday, 2 October 2019
Checkpoint 156-115.77 Questions Answers
The command fw monitor -p all displays what type of information?
A. It captures all points of the chain as the packet goes through the firewall kernel.
B. This is not a valid command.
C. The -p is used to resolve MAC address in the firewall capture.
D. It does a firewall monitor capture on all interfaces.
Answer: A
A. It captures all points of the chain as the packet goes through the firewall kernel.
B. This is not a valid command.
C. The -p is used to resolve MAC address in the firewall capture.
D. It does a firewall monitor capture on all interfaces.
Answer: A
Friday, 30 November 2018
Checkpoint 156-115.77 Question Answer
What command would you use for a packet capture on an absolute position for TCP streaming (out) 1ffffe0
A. fw ctl chain -po 1ffffe0 -o monitor.out
B. fw monitor -po -0x1ffffe0 -o monitor.out
C. fw monitor -e 0x1ffffe0 -o monitor.out
D. fw monitor -pr 1ffffe0 -o monitor.out
Answer: B
A. fw ctl chain -po 1ffffe0 -o monitor.out
B. fw monitor -po -0x1ffffe0 -o monitor.out
C. fw monitor -e 0x1ffffe0 -o monitor.out
D. fw monitor -pr 1ffffe0 -o monitor.out
Answer: B
Monday, 15 October 2018
Checkpoint 156-115.77 Question Answer
How do you designate the “enforcement point gateway” for the peers involved in “VPN Directional Enforcement”?
A. From the WebUI’s of the peers add a static route to the “designated enforcement point”.
B. In the file $FWDIR/conf/user.def on each peer with a route entry to the enforcement point gateway.
C. Designate this gateway in the VPN community properties.
D. Editing file $FWDIR/conf/vpn_route.conf on each peer with a route entry to the enforcement point gateway.
Answer: D
Where do you configure VTIs on your R77 gateway in VSX mode?
A. VTIs are configured in each VS context.
B. VTIs are configured in VS0 context.
C. VTIs are not supported in VSX mode.
D. VTIs are configured in SmartDashboard.
Answer: C
A. From the WebUI’s of the peers add a static route to the “designated enforcement point”.
B. In the file $FWDIR/conf/user.def on each peer with a route entry to the enforcement point gateway.
C. Designate this gateway in the VPN community properties.
D. Editing file $FWDIR/conf/vpn_route.conf on each peer with a route entry to the enforcement point gateway.
Answer: D
Where do you configure VTIs on your R77 gateway in VSX mode?
A. VTIs are configured in each VS context.
B. VTIs are configured in VS0 context.
C. VTIs are not supported in VSX mode.
D. VTIs are configured in SmartDashboard.
Answer: C
Tuesday, 10 July 2018
BTIG Upgrades Checkpoint Software (CHKP) to Buy
BTIG updated Checkpoint Software (NASDAQ: CHKP) from Neutral to Buy with a target price of $ 120.00.
Analsyt Joel Fishbein commented: "After 3 quarters of stagnant stock performance and 4 quarters of disappointing Check Point guidance, we believe it is time to be constructive again in the name." In a previous note, we noticed that we have been looking for incremental evidence We believe that both criteria are now true.
When the company originally started the F18 guidance it implied ~ 5% growth in the top line of the sales force and signs of a minimum in expectations before re-evaluating our perspective. , at that time disappointing investors who expected a re-acceleration or, at least, flat growth after a 6.5% growth in F17.As we look down a 2Q impression with an F18 guideline that now implies a growth of 2 % on the top line, we feel that the -up set is now in favor of Check Point for the remainder of the fiscal year, and our checks indicate that and traction in the sales force ramp and with Infinity Architecture GTM. In short, Check Point is a solid b use with incredible operating margins (~ 53%) and attractive FCF performance (~ 7%) that has been out of date for what has been a great year for the broader cybersecurity sector.
We see potential for the increase in estimates and multiple expansion as the company regains its equilibrium in the coming quarters. We are updating to Buy with a PT of $ 120, which implies 15x EV / F18 FCF ".

Analsyt Joel Fishbein commented: "After 3 quarters of stagnant stock performance and 4 quarters of disappointing Check Point guidance, we believe it is time to be constructive again in the name." In a previous note, we noticed that we have been looking for incremental evidence We believe that both criteria are now true.
When the company originally started the F18 guidance it implied ~ 5% growth in the top line of the sales force and signs of a minimum in expectations before re-evaluating our perspective. , at that time disappointing investors who expected a re-acceleration or, at least, flat growth after a 6.5% growth in F17.As we look down a 2Q impression with an F18 guideline that now implies a growth of 2 % on the top line, we feel that the -up set is now in favor of Check Point for the remainder of the fiscal year, and our checks indicate that and traction in the sales force ramp and with Infinity Architecture GTM. In short, Check Point is a solid b use with incredible operating margins (~ 53%) and attractive FCF performance (~ 7%) that has been out of date for what has been a great year for the broader cybersecurity sector.
We see potential for the increase in estimates and multiple expansion as the company regains its equilibrium in the coming quarters. We are updating to Buy with a PT of $ 120, which implies 15x EV / F18 FCF ".
Thursday, 1 March 2018
Checkpoint 156-115.77 Question Answer
You have created a number of profiles and activated the relevant protections. Afterwards, you decide that the ‘Enterprise gateway’ should allow instant messaging. The current profile enabled for Enterprise gateway blocks instant messaging. The profile for the
Enterprise gateway is currently being used on the Voyager gateway and the Bird of Prey gateway. What is the best process for making this change on the Enterprise gateway only?
A. Create an exception for the Enterprise gateway
B. Create a rule allowing that traffic and install it on the Enterprise gateway
C. Create a new profile and apply to the Enterprise gateway
D. Edit the existing profile
Answer: A
The current release of Check Point R77, what is a potential performance-related drawback to using Virtual Tunnel Interfaces (VTI) rather than Domain-based VPNs?
A. Use of VTIs will disable CoreXL and therefore will negatively impact hardware platforms
running more than one CPU core.
B. Dynamic routing protocols will work across a domain-based VPN, but will not work
across a VTI.
C. Use of VTIs will disable the entire SecureXL mechanism and prevent any traffic
acceleration.
D. Domain-based VPNs are easier to configure than VTIs and therefore is the preferred
implementation.
Answer: A
Enterprise gateway is currently being used on the Voyager gateway and the Bird of Prey gateway. What is the best process for making this change on the Enterprise gateway only?
A. Create an exception for the Enterprise gateway
B. Create a rule allowing that traffic and install it on the Enterprise gateway
C. Create a new profile and apply to the Enterprise gateway
D. Edit the existing profile
Answer: A
The current release of Check Point R77, what is a potential performance-related drawback to using Virtual Tunnel Interfaces (VTI) rather than Domain-based VPNs?
A. Use of VTIs will disable CoreXL and therefore will negatively impact hardware platforms
running more than one CPU core.
B. Dynamic routing protocols will work across a domain-based VPN, but will not work
across a VTI.
C. Use of VTIs will disable the entire SecureXL mechanism and prevent any traffic
acceleration.
D. Domain-based VPNs are easier to configure than VTIs and therefore is the preferred
implementation.
Answer: A
Monday, 22 January 2018
Checkpoint 156-115.77 Question Answer
In order to perform some connection troubleshooting, you run the command fw monitor –e accept dport = 443. You do NOT see the TCP ACK packet. Why is this?
A. The connection is encrypted.
B. The connection is NATted.
C. The connection is dropped.
D. The connection is accelerated.
Answer: D
What should you do after editing fwkern.conf to enable NAT templates?
A. Install database
B. Reboot
C. Install policy
D. Make sure the change shows up in Smartview Monitor
Answer: B
A. The connection is encrypted.
B. The connection is NATted.
C. The connection is dropped.
D. The connection is accelerated.
Answer: D
What should you do after editing fwkern.conf to enable NAT templates?
A. Install database
B. Reboot
C. Install policy
D. Make sure the change shows up in Smartview Monitor
Answer: B
Subscribe to:
Posts (Atom)