The Replace Guide To 156-115.77 cram Feb 2021

we provide Tested Check Point 156-115.77 exams which are the best for clearing 156-115.77 test, and to get certified by Check Point Check Point Certified Security Master. The 156-115.77 Questions & Answers covers all the knowledge points of the real 156-115.77 exam. Crack your Check Point 156-115.77 Exam with latest dumps, guaranteed!

Q11. - (Topic 5) 

When are rules that include identity awareness access roles accelerated through SecureXL? 

A. Rules using Identity Awareness are always accelerated. 

B. Only when ‘Unauthenticated Guests’ is included in the access role. 

C. They have no bearing on whether the connection for the rule is accelerated. 

D. Rules using Identity Awareness are never accelerated. 


Q12. - (Topic 7) 

Which file holds global Kernel values to survive reboot in a Check Point R77 gateway? 

A. $FWDIR/conf/fwkern.conf 

B. $FWDIR/boot/modules/fwkern.conf 

C. $FWDIR/boot/confwkern.conf 

D. $FWDIR/boot/fwkern.conf 


Q13. - (Topic 3) 

Which command can be used to see all active modules on the Security Gateway: 

A. fw ctl zdebug drop 

B. fw ctl debug -h 

C. fw ctl chain 

D. fw ctl debug -m 


Q14. - (Topic 1) 

A fwm debug provides the following output. What prevents the customer from logging into SmartDashboard? 

A. There are not any policy to login in SmartDashboard 

B. FWM process is crashed and returned null to access 

C. User and password are incorrect 

D. IP not defined in $FWDIR/conf/gui-clients 


25. - (Topic 1) 

Compare these two images to establish which blade/feature was disabled on the firewall. 




D. L2TP 


Q15. - (Topic 5) 

When optimizing a customer firewall Rule Base, what is the BEST way to start the analysis? 

A. With the command fwaccel stat followed by the command fwaccel stats. 

B. At the top of the Rule Base. 

C. Using the hit count column. 

D. Using the Compliance Software Blade. 


Q16. - (Topic 10) 

You enabled IPv6 in your environment and would like to erase all IPv6 connection tables. How can you do it? 

A. fw tab –t connections –x 

B. fw tab –t connections6 –x 

C. clear connections table ipv6 

D. fw6 tab –t connections –x 


Q17. - (Topic 4) 

Check Point Best Practices suggest that when you finish a kernel debug, you should run the command _____________________ . 

A. fw debug 0 

B. fw debug off 

C. fw ctl debug default 

D. fw ctl debug 0 


Q18. - (Topic 6) 

You want to verify that the majority of your connections are being optimized by SecureXL. What command would you run to establish this information? 

A. fw ctl pstat 

B. fw tab -t connections -s 

C. fwaccel conns -s 

D. sim_dbg -s 


Q19. - (Topic 3) 

Which of the following commands shows the high watermark threshold for triggering the cluster under load mechanism in R77? 

A. fw ctl get int fwha_cul_mechanism_enable 

B. fw ctl get int fwha_cul_cluster_short_timeout 

C. fw ctl get int fwha_cul_member_cpu_load_limit 

D. fw ctl get int fwha_cul_policy_freeze_event_timeout_millisec 


Q20. - (Topic 6) 

What is the difference between “connection establishment acceleration” (templating) and “traffic acceleration”? 

A. These are the same technologies with different names. 

B. “Connection establishment acceleration” only accelerates a single connection, while “traffic acceleration” accelerates similar traffic. 

C. “Traffic acceleration” is accelerated through hardware, and “connection establishment acceleration” is accelerated in software. 

D. “Traffic acceleration” only accelerates a single connection, while “connection establishment acceleration” accelerates similar traffic.