Free 156-115.80 Exam Braindumps

Which of the following is NOT a special consideration while running fw monitor on production firewall?

  1. While executing fw monitor, you need to specify an expression so that it captures the required traffic instead of all traffic
  2. While running fw monitor on a busy firewall, the –ci <count> and –co <count> switches can be used to limit the number of packets captured
  3. While running fw monitor, it resets all the debug flags
  4. During a fw monitor, the firewall will have to process more packets because SecureXL acceleration should be disabled

Answer(s): C



In R80 spoofing is defined as a method of:

  1. Disguising an illegal IP address behind an authorized IP address through Port Address Translation
  2. Hiding your firewall from unauthorized users
  3. Detecting people using false or wrong authentication logins
  4. Making packets appear as if they come an authorized IP address

Answer(s): D



Which of the following inputs is suitable for debugging HTTPS inspection issues?

  1. vpn debug cptls on
  2. fw ctl debug –m fw + conn drop cptls
  3. fw diag debug tls enable
  4. fw debug tls on TDERROR_ALL_ALL=5

Answer(s): B


Reference:

https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk108202



Which of the connections cannot be accelerated with SecureXL?

  1. Every NAT’ed connection
  2. Every encrypted connection, such as HTTPS or SSH connections
  3. Every connection destined to the Security Gateways
  4. Every connection through a rule using a time object

Answer(s): A






Post your Comments and Discuss Checkpoint 156-115.80 exam with other Community members:

156-115.80 Discussions & Posts