Checkpoint 156-115.80 Exam
Check Point Certified Security Master - R80 (Page 4 )

Updated On: 7-Feb-2026

What must be done for the “fw monitor” command to capture packets through the firewall kernel?

  1. SecureXL must be disabled
  2. ClusterXL must be temporarily disabled
  3. Firewall policy must be re-installed
  4. The output file must be transferred to a machine with WireShark

Answer(s): A


Reference:

https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk30583



Consider a Check Point Security Gateway under high load. What mechanism can be used to confirm that important traffic such as control connections are not dropped?

  1. fw debug fgd50 on OPSEC_DEBUG_LEVEL=3
  2. fw ctl multik prioq
  3. fgate –d load
  4. fw ctl debug –m fg all

Answer(s): B



What is the default and maximum number of entries in the ARP Cache Table in a Check Point appliance?

  1. 1,024 and 4,096
  2. 4,096 and 16,384
  3. 4,096 and 65,536
  4. 1,024 and 16,384

Answer(s): D


Reference:

https://sc1.checkpoint.com/documents/R76/CP_R76_Gaia_WebAdmin/73181.htm



Which kernel debug flag should you use to troubleshoot NAT connections?

  1. fw ctl debug + xlate xltrc nat table
  2. fw ctl debug + xltrc xlate nat conn
  3. fw ctl debug + xlate xltrc nat conn drop
  4. fw ctl debug + fwx_alloc nat conn drop

Answer(s): C



You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?

  1. Eliminate all possible contradictory rules such as the Stealth or Cleanup rules
  2. Create a separate Security Policy package for each remote Security Gateway
  3. Create network objects that restrict all applicable rules to only certain networks
  4. Run separate SmartConsole instances to login and configure each Security Gateway directly

Answer(s): B






Post your Comments and Discuss Checkpoint 156-115.80 exam prep with other Community members:

Join the 156-115.80 Discussion