Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Checkpoint 156-515 Exam -

Free 156-515 Sample Questions:

Q: 1 Which files should be acquired from a Windows 2003 Server system crash with a Dr. Watson error?

A. drwtsn32.log
B. vmcore.log
C. core.log
D. memory.log
E. info.log

Answer: A

Q: 2 VPN debugging information is written to which of the following files?

A. FWDIR/log/ahttpd.elg
B. FWDIR/log/fw.elg
C. $FWDIR/log/ike.elg
D. FWDIR/log/authd.elg
E. FWDIR/log/vpn.elg

Answer: C

Q: 3 fw monitor packets are collected from the kernel in a buffer. What happens if the buffer becomes full?

A. The information in the buffer is saved and packet capture continues, with new data stored in the buffer.
B. Older packet information is dropped as new packet information is added.
C. Packet capture stops.
D. All packets in it are deleted, and the buffer begins filling from the beginning.

Answer: D

Q: 4 Which file provides the data for the host_table output, and is responsible for keeping a record of all internal IPs passing through the internal interfaces of a restricted hosts licensed Security Gateway?

A. hosts.h
B. external.if
C. hosts
D. fwd.h
E. fwconn.h

Answer: D

Q: 5 You modified the *def file on your Security Gateway, but the changes were not applied. Why?

A. There is more than one *.def file on the Gateway.
B. You did not have the proper authority.
C. *.def files must be modified on the SmartCenter Server.
D. The *.def file on the Gateway is read-only.

Answer: C

Q: 6 Assume you have a rule allowing HTTP traffic, on port 80, to a specific Web server in a Demilitarized Zone (DMZ). If an external host port scans the Web server's IP address, what information will be revealed?

A. Nothing; the NGX Security Server automatically block all port scans.
B. All ports are open on the Security Server.
C. All ports are open on the Web server.
D. The Web server's file structure is revealed.
E. Port 80 is open on the Web server.

Answer: E

Q: 7 Which of the following types of information should an Administrator use tcpdump to view?

A. DECnet traffic analysis
B. VLAN trunking analysis
C. NAT traffic analysis
D. Packet-header analysis
E. AppleTalk traffic analysis

Answer: D

Q: 8 Which statement is true for route based VPNs?

A. IP Pool NAT must be configured on each gateway
B. Route-based VPNs replace domain-based VPNs
C. Route-based VPNs are a form of partial overlap VPN Domain
D. Packets are encrypted or decrypted automatically
E. Dynamic-routing protocols are not required

Answer: E

Q: 9 The list below provides all the actions Check Point recommends to troubleshoot a problem with an NGX product.

(A).List Possible Causes
(B).Identify the Problem
(C).Collect Related Information
(D).Consult Various Reference Sources
(E).Test Causes Individually and Logically

Select the answer that shows the order of the recommended actions that make up Check Point's troubleshooting guidelines?

A. B, C, A, E, D
B. A, E, B, D, C
C. A, B, C, D, E
D. B, A, D, E, C
E. D, B, A, C, E

Answer: A

Q: 10 NGX Wire Mode allows:

A. Peer gateways to establish a VPN connection automatically from predefined preshared secrets.
B. Administrators to verify that each VPN-1 SecureClient is properly configured, before allowing it access to the protected domain.
C. Peer gateways to fail over existing VPN traffic, by avoiding Stateful Inspection.
D. Administrators to monitor VPN traffic for troubleshooting purposes.
E. Administrators to limit the number of simultaneous VPN connections, to reduce the traffic load passing through a Security Gateway.

Answer: C

Q: 11 Which of the following commands identifies whether or not a Security Policy is installed or the Security Gateway is operating with the Initial Policy?

A. fw monitor
B. cp policy
C. cp stat
D. fw policy
E. fw stat

Answer: E

Q: 12 A SecuRemote/SecureClient tunnel test uses which port?

A. UDP 18233
B. UDP 2746
C. UDP 18234
D. TCP 18231
E. UDP 18321

Answer: C

Q: 13 Which of the following vpn debug options purges ike.elg and vpnd.elg, and creates a time stamp before starting ike debug and vpn debug at the same time?

A. ike on
B. timeon
C. trunc
D. ikefail
E. mon

Answer: C

Q: 14 Gus is troubleshooting a problem with SMTP. He has enabled debugging on his Security Gateway and needs to copy the *.elg files into an archive to send to Check Point Support. Which of the following files does Gus NOT need to send?

A. fwd.elg
B. mdq.elg
C. diffserv.elg
D. asmtpd.elg

Answer: C

Q: 15 How can you view cpinfo on a SecurePlatform Pro machine?

A. snoop -i
B. infotab
C. tcpdump
D. Text editor, such as vi
E. infoview

Answer: D

Q: 16 When VPN-1 NGX starts after reboot, with no installed Security Policy, which of these occurs?

A. All traffic except HTTP connections is blocked.
B. All traffic except SmartDefense Console connections is blocked.
C. All traffic is blocked.
D. All traffic except SmartConsole/SmartCenter Server connections is blocked.
E. All traffic is allowed.

Answer: D

Q: 17 Which of the following commands would you run to debug a VPN connection?

A. debug vpn ike
B. debug vpn ikeon
C. vpn debug ike
D. debug vpn ike on
E. vpn debug ikeon

Answer: E

Q: 18 Which one of these is a temporary pointer log file?

A. $FWDIR/log/xx.logptr
B. $FWDIR/log/xx.log
C. $FWDIR/log/xx.logaccount_ptr
D. $FWDIR/log/xx.logLuuidDB

Answer: D

Q: 19 When collecting information relating to the perceived problem, what is the most important question to ask?

A. Is this problem repeatable?
B. Is this problem software or hardware related?
C. Under what circumstances does this problem occur?
D. What action or state am I trying to achieve?
E. Does the problem appear random or can you establish a pattern?

Answer: C

Q: 20 The virtual machine inspects each packet at the following points:

-Before the virtual machine, in the inbound direction (i or PREIN)
-After the virtual machine, in the inbound direction (I or POSTIN)
-Before the virtual machine, in the outbound direction (o or PREOUT)
-After the virtual machine, in the outbound direction (O or POSTOUT)

If Ethereal displays a packet with i, I, o, and O entries, what does that likely indicate?

A. The packet was rejected by the Rule Base. B. The packet was destined for the Gateway.
C. Nothing unusual; the o and O entries only appear if there is a kernel-level error.
D. The packet was rerouted by the Gateway's OS.
E. The packet arrived at the kernel and left the Security Gateway successfully.

Answer: E

Q: 21 To stop the sr_service debug process, you must first stop VPN-1 SecureClient, delete which of the following files, and restart SecureClient?

A. sr_auth.all
B. sr_topo.all
C. sr_tde.all
D. sr_service.all
E. sr_users.all

Answer: C

Q: 22 Which of the following fw monitor commands only captures traffic between IP addresses and

A. fw monitor -e "accept src= or dst= or src= or dst=;"
B. fw monitor -e "accept src= or dst=; src= or dst=;"
C. fw monitor -e "accept src=192.168.111 and dst=; src= and dst=;"
D. fw monitor -e "accept src= or dst=; and src= or dst=;"
E. fw monitor -e "accept (src= and dst= or (src= and dst=;"

Answer: E

Q: 23 To start both vpnd.elg and ike.elg, which single vpn debug command would you use?

A. vpn debug vpnd.elg +ike
B. vpn debug ikeinit
C. vpn debug ikeon
D. vpn debug trunc
E. vpn tu

Answer: D

Q: 24 Which of the following explanations best describes the audit log file xx.adtloginitial_ptr?

A. Pointers to the beginning of each accounting record
B. Additional temporary pointer file
C. Pointers to the beginning of each log chain
D. Audit log records
E. Pointers to the beginning of each log record

Answer: C

Q: 25 If you run only fw monitor without any parameters, where does the output display?

A. In /tmp/log/monitor.out
B. In $FWDIR/bin
C. In /var/log/monitor.out
D. On the console
E. In /var/adm/monitor.out

Answer: D

Q: 26 Which of the following commands can you run to view packet flow of a VPN-1 SecuRemote/SecureClient connection?

A. cpd monitor
B. vpn monitor
C. fw monitor
D. srfw monitor
E. sc monitor

Answer: D

Q: 27 Pulling Certificates from an ICA uses which port?

A. Port 18211
B. Port 18212
C. Port 18209
D. Port 18210

Answer: D

Q: 28 The output of tcpdump is a binary file. Which of the following commands will write the tcpdump file into an ASCII file through std_out?

A. tcpdump <file_name> &> <file_name>
B. tcpdump <file_name> ?> <file_name>
C. tcpdump <file_name> %> <file_name>
D. tcpdump <file_name> > <file_name>
E. tcpdump <file_name> *> <file_name>

Answer: A

Q: 29 Setting snaplen to 0 will capture how much of the packet data?

A. None of the packet.
B. The whole packet.
C. The first octet of the packet header.
D. The first protocol level of the packet.

Answer: B

© 2014, All Rights Reserved