Which file would you need to make sure you collect when debugging a VPN that fails to establish that is configured to use IKEv2?
A. $FWDIR/log/ike2.elg
B. $FWDIR/log/vpnd.xml.v2
C. $FWDIR/log/ikev2.xml
D. $CPDIR/log/ike.elg
Joey's implementing a new R80.10 firewall cluster into the network. During the implementation he notices
that the cluster object is in error state in SmartConsole. He tries to figure out the cause of the problem and
runs a ClusterXL kernel debug with command: ‘fw ctl debug –m cluster + stat pnote conf ccp’
ClusterXL kernel debug shows him following info: fwha_set_new_local_state: Old version HA machines
exist around so prevent state change to READY.
How can he solve the problem?
A. cphaconf cluster_id set
B. cphaprob mmagic
C. Connect with GuiDBedit Tool to Security Management Server. Go to Table – Network Objects – network_objects. Select the relevant R80.10 Cluster object. Go to Search menu – Find – paste mac_magic. Right-click on the mac_magic the object – select Edit… and change the value to 254.
Save changes and install policy.
D. Connect with GuiDBedit Tool to Security Management Server. Go to Table – Network Objects – network_objects. Select the relevant R80.10 Cluster object. Go to Search menu – Find – paste cluster_magic. Right-click on the cluster_magic the object – select Edit… and change the value between 1 and 253. Save changes and install policy.
Which of the connections cannot be accelerated with SecureXL?
A. Every NAT'ed connection
B. Every encrypted connection, such as HTTPS or SSH connections
C. Every connection destined to the Security Gateways
D. Every connection through a rule using a time object
Which of the following ports are used for SIC?
A. 18355 and 18356
B. 18210 and 18211
C. 257 and 258
D. 18192 and 18193
In R80 spoofing is defined as a method of:
A. Disguising an illegal IP address behind an authorized IP address through Port Address Translation
B. Hiding your firewall from unauthorized users
C. Detecting people using false or wrong authentication logins D. Making packets appear as if they come an authorized IP address
Which of the following inputs is suitable for debugging HTTPS inspection issues?
A. vpn debug cptls on
B. fw ctl debug –m fw + conn drop cptls
C. fw diag debug tls enable
D. fw debug tls on TDERROR_ALL_ALL=5
What process(es) should be checked if there is high I/O and you suspect it may be related to the Antivirus Software Blade?
A. avsp
B. dlpu and rad processes
C. cpta
D. cpm and fwm
Which of the following is NOT a special consideration while running fw monitor on production firewall?
A. While executing fw monitor, you need to specify an expression so that it captures the required traffic instead of all traffic
B. While running fw monitor on a busy firewall, the –ci
C. While running fw monitor, it resets all the debug flags
D. During a fw monitor, the firewall will have to process more packets because SecureXL acceleration should be disabled
What is the correct command to turn off an IKE debug?
A. vpn debug ikeoff
B. fw ctl debug ikeoff
C. vpn debug ikeoff 0
D. fw ctl vpn debug ikeoff
Which command is used to enable IPv6 on Security Gateway?
A. set ipv6-state on
B. add ipv6 interface on
C. set ipv6-enable on
D. set ipv6-state enabled
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CheckPoint exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 156-115.80 exam preparations and CheckPoint certification application, do not hesitate to visit our Vcedump.com to find your solutions here.