It is more faster and easier to pass the Check Point 156-115.77 exam by using High quality Check Point Check Point Certified Security Master questuins and answers. Immediate access to the Update 156-115.77 Exam and find the same core area 156-115.77 questions with professionally verified answers, then PASS your exam with a high score now.

2021 Nov 156-115.77 exam fees

Q81. - (Topic 4) 

When VPN user-based authentication fails, which of the following debug logs is essential to understanding the issue? 

A. VPN-1 kernel debug logs 

B. IKE.elg 

C. Vpnd.elg 

D. fw monitor trace 

Answer:


Q82. - (Topic 9) 

In IPS which of the two initial profiles is the more resource intensive? 

A. Prevention 

B. Standard 

C. Default 

D. Recommended 

Answer:


Q83. - (Topic 11) 

When configuring a Numbered VPN-Tunnel, what parameters are necessary? 

A. VPN Tunnel ID, Local Address, Remote Address 

B. Peer, Local Address, Remote Address 

C. VPN Tunnel ID, Peer, Local Address, Remote Address 

D. VPN Tunnel ID, Peer, Physical Device 

Answer:


Q84. - (Topic 5) 

When running a SecureXL debug how do you initialize the debug buffer to 32000? 

A. fwaccel debug –buf 32000 

B. fw ctl debug –buf 32000 

C. sim debug –buf 32000 

D. fwaccel dbg –buf 32000 

Answer:


Q85. - (Topic 11) 

Where can you configure Wire mode? 

A. In the gateway object in “Stateful Inspection” 

B. In the VPN community in “Advanced Settings” 

C. In cpconfig 

D. In Global Properties 

Answer:


Replace 156-115.77 free practice questions:

Q86. - (Topic 3) 

Which command should you use to stop kernel module debugging (excluding SecureXL)? 

A. fw ctl debug 0 

B. fw ctl zdebug - all 

C. fw debug fwd off; vpn debug off 

D. fw debug fwd off 

Answer:


Q87. - (Topic 8) 

What is the method to change the number of cores that CoreXL will use? 

A. cpconfig 

B. SmartDashboard 

C. sysconfig 

D. CoreXL automatically recognizes the number of cores on a system at startup so there is no method or reason to modify the setting. 

Answer:


Q88. - (Topic 4) 

Check Point Best Practices suggest that when you finish a kernel debug, you should run the command _____________________ . 

A. fw debug 0 

B. fw debug off 

C. fw ctl debug default 

D. fw ctl debug 0 

Answer:


Q89. - (Topic 9) 

When the IPS ‘Bypass under Load’ mechanism detects that the certain CPU and memory usage thresholds have been reached, which of the following occurs? 

A. The mechanism configures all IPS protections in ‘Detect Mode’ 

B. IPS is disabled completely 

C. The mechanism disables all IPS protections by placing them under ‘exception’ 

D. Stateful Inspection is disabled 

Answer:


Q90. - (Topic 1) 

What flag option(s) must be used to dump the complete table in friendly format, assuming there are more than one hundred connections in the table? 

A. fw tab -t connections -f 

B. fw tab -t connect -f -u 

C. fw tab -t connections -s 

D. fw tab -t connections -f –u 

Answer: