Which Check Point daemon, if it stops responding or goes down, results in connections from the SmartConsole to the Management Server failing?
A. SMSD
B. CPTA
C. CPM
D. FWD
How can you ensure that a particular service does not use the cluster IP address?
A. Add the corresponding service port and IP protocol number into the "no_hide_services_ports" section of the table.def file
B. Add the corresponding service port and IP protocol number into the "hide_services_ports" section of the table.def file
C. Add the corresponding service port and IP protocol number into the "no_hide_services_ports" section of the user.def file
D. Add the corresponding service port and IP protocol number into the "hide_services_ports" section of the user.def file
Which "fwm" command syntax will instruct the gateway to load its most recent policy?
A. fwm fetch localhost
B. fwm –d fetchlocal
C. fwm load
D. None, as "fwm" can only be executed on management servers
Which of the following is correct in a Threat Prevention policy?
A. Threat Prevention inspects traffic to all objects specified in the Protected Scope
B. Threat Prevention inspects traffic to and/or from all objects specified in the Protected Scope
C. Threat Prevention is applied based on the profile. Protection Scope does not have any relevance
D. Threat Prevention inspects traffic from all objects specified in the protected Scope
A Firewall administrator is attempting to push a policy to a new Security Gateway for a remote office but the installation fails. The Management Server IP is 10.1.1.101. Initial troubleshooting shows that policy is successfully transferred to the Gateway. What command would you use to attempt to identify the cause of the issue?
A. fw ctl debug –T –f > /var/log/p_debug.txt
B. cp_merge export_policy –s 10.1.1.101 –n Standard $var/log/
C. fw ctl debug –m 10.1.1.101
D. fw fetchlocal –d $FWDIR/state/_tmp/FW1
Where will the command, "fw monitor -pi -vpn", be inserted into the ctl chain?
A. Before the Fw VM inbound
B. Before the vpn module
C. After the Fw VM outbound
D. After the vpn module
What does CMI stand for in relation to the Access Control Policy?
A. Content Matching Infrastructure
B. Content Management Interface
C. Context Management Infrastructure
D. Context Manipulation Interface
The maximum number of critical devices or pnotes on a cluster member is what?
A. 8
B. 24
C. 32
D. 16
If certain services should not use the Cluster Object IP Address, but requires the use of the individual Cluster Member IPs, what steps would be required for configuration?
A. Create Manual NAT rules in the Security Policy
B. The configuration is not possible
C. Edit the table.def file on the Management Server
D. Edit the fwkern.conf on each Cluster Member
What is the difference between Client-Side and Server-Side NAT?
A. The translation occurs at the kernel nearest the server for client-side NAT, but for server-side NAT, the translation occurs at the kernel nearest the client
B. The translation occurs at the kernel nearest the server in both cases. So, there is no difference at all
C. The translation occurs at the kernel nearest the client for client-side NAT, but for server-side NAT, the translation occurs at the kernel nearest the server
D. The translation occurs at the kernel nearest the client in both cases. So, there is no difference at all
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CheckPoint exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 156-115.80 exam preparations and CheckPoint certification application, do not hesitate to visit our Vcedump.com to find your solutions here.