Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Checkpoint 156-315.75 Exam - Cheat-Test.com

Free 156-315.75 Sample Questions:

Q: 1
Control connections between the Security Management Server and the Gateway are not encrypted by the VPN Community. How are these connections secured?
A. They are encrypted and authenticated using SIC.
B. They are not encrypted, but are authenticated by the Gateway
C. They are secured by PPTP
D. They are not secured.
Answer: D

Q: 2
If Bob wanted to create a Management High Availability configuration, what is the minimum number of Security Management servers required in order to achieve his goal?
A. Three
B. Two
C. Four
D. One
Answer: D

Q: 3
Which of the following statements accurately describes the upgrade_export command?
A. Used primarily when upgrading the Security Management Server, upgrade_export stores all object databases and the conf directories for importing to a newer version of the Security Gateway.
B. Used when upgrading the Security Gateway, upgrade_export includes modified files, such as in the directories /lib and /conf.
C. upgrade_export is used when upgrading the Security Gateway, and allows certain files to be included or excluded before exporting.
D. upgrade_export stores network-configuration data, objects, global properties, and the database revisions prior to upgrading the Security Management Server.
Answer: A

Q: 4
From the following output of cphaprob state, which ClusterXL mode is this?
A. New mode
B. Multicast mode
C. Legacy mode
D. Unicast mode
Answer: D

Q: 5
Which of the following is NOT a feature of ClusterXL?
A. Enhanced throughput in all ClusterXL modes (2 gateway cluster compared with 1 gateway)
B. Transparent failover in case of device failures
C. Zero downtime for mission-critical environments with State Synchronization
D. Transparent upgrades
Answer: C

Q: 6
In which case is a Sticky Decision Function relevant?
A. Load Sharing - Unicast
B. Load Balancing - Forward
C. High Availability
D. Load Sharing - Multicast
Answer: C

Q: 7
You configure a Check Point QoS Rule Base with two rules: an HTTP rule with a weight of 40, and the Default Rule with a weight of 10. If the only traffic passing through your QoS Module is HTTP traffic, what percent of bandwidth will be allocated to the HTTP traffic?
A. 80%
B. 40%
C. 100%
D. 50%
Answer: D

Q: 8
You have pushed a policy to your firewall and you are not able to access the firewall. What command will allow you to remove the current policy from the machine?
A. fw purge policy
B. fw fetch policy
C. fw purge active
D. fw unloadlocal
Answer: A

Q: 9
How do you verify the Check Point kernel running on a firewall?
A. fw ctl get kernel
B. fw ctl pstat
C. fw kernel
D. fw ver -k
Answer: B

Q: 10
The process ________________ compiles $FWDIR/conf/*.W files into machine language.
A. fw gen
B. cpd
C. fwd
D. fwm
Answer: A

Q: 11
Which of the following is NOT part of the policy installation process?
A. Code compilation
B. Code generation
C. Initiation
D. Validation
Answer: D

Q: 12
When, during policy installation, does the atomic load task run?
A. It is the first task during policy installation.
B. It is the last task during policy installation.
C. Before CPD runs on the Gateway.
D. Immediately after fwm load runs on the SmartCenter.
Answer: B

Q: 13
What process is responsible for transferring the policy file from SmartCenter to the Gateway?
A. FWD
B. FWM
C. CPRID
D. CPD
Answer: D

Q: 14
What firewall kernel table stores information about port allocations for Hide NAT connections?
A. NAT_dst_any_list
B. host_ip_addrs
C. NAT_src_any_list
D. fwx_alloc
Answer: D

Q: 15
Where do you define NAT properties so that NAT is performed either client side or server side?
A. In SmartDashboard under Gateway setting
B. In SmartDashboard under Global Properties > NAT definition
C. In SmartDashboard in the NAT Rules
D. In file $DFWDIR/lib/table.def
Answer: B

Q: 16
The process ___________ is responsible for all other security server processes run on the
Gateway.
A. FWD
B. CPLMD
C. FWM
D. CPD
Answer: A

Q: 17
The process ________ is responsible for GUIClient communication with the SmartCenter.
A. FWD
B. FWM
C. CPD
D. CPLMD
Answer: B

Q: 18
The process ________ is responsible for Policy compilation.
A. FWM
B. Fwcmp
C. CPLMD
D. CPD
Answer: A

Q: 19
The process ________ is responsible for Management High Availability synchronization.
A. CPLMD
B. FWM
C. Fwsync
D. CPD
Answer: B

Q: 20
_________ is the called process that starts when opening SmartView Tracker application.
A. logtrackerd
B. fwlogd
C. CPLMD
D. FWM
Answer: C

Q: 21
Anytime a client initiates a connection to a server, the firewall kernel signals the FWD process
using a trap. FWD spawns the ________ child service, which runs the security server.
A. FWD
B. FWSD
C. In.httpd
D. FWSSD
Answer: D

Q: 22
Security server configuration settings are stored in _______________ .
A. $FWDIR/conf/AMT.conf
B. $FWDIR/conf/fwrl.conf
C. $FWDIR/conf/fwauthd.conf
D. $FWDIR/conf/fwopsec.conf
Answer: C

Q: 23
User definitions are stored in ________________ .
A. $FWDIR/conf/fwmuser
B. $FWDIR/conf/users.NDB
C. $FWDIR/conf/fwauth.NDB
D. $FWDIR/conf/fwusers.conf
Answer: C

Q: 24
Jon is explaining how the inspection module works to a colleague. If a new connection passes
through the inspection module and the packet matches the rule, what is the next step in the
process?
A. Verify if the packet should be moved through the TCP/IP stack.
B. Verify if any logging or alerts are defined.
C. Verify if the packet should be rejected.
D. Verify if another rule exists.
Answer: B


© 2014 Cheat-Test.com, All Rights Reserved