CheckPoint 156-115-80 practice test

Check Point Certified Security Master - R80

Last exam update: Nov 18 ,2025
Page 1 out of 11. Viewing questions 1-15 out of 159

Question 1

Tom has been tasked to install Check Point R80 in a distributed deployment. Before Tom installs the
systems this way, how many machines will he need if he does NOT include a SmartConsole machine
in his calculations?

  • A. One machine, but it needs to be installed using SecurePlatform for compatibility purposes
  • B. One machine
  • C. Two machines
  • D. Three machines
Mark Question:
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

In order to test ClusterXL failovers which command would you use on one of the ClusterXL nodes to
initiate a failover?

  • A. clusterXL_admin down -p
  • B. cluster XL_admin up -p
  • C. cphaprob -d TEST -s ok register
  • D. cphaprob -d TEST -s problem unregister
Mark Question:
Answer:

A


Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_ClusterXL_AdminGuide/7298.htm#o97358

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

Which of the following is NOT a valid “fwaccel” parameter?

  • A. stat
  • B. stats
  • C. templates
  • D. packets
Mark Question:
Answer:

D


Reference:
https://supportcenter.checkpoint.com/supportcenter/portal
?
eventSubmit_doGoviewsolutiondetails=&solutionid=sk41397

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

Which of the following is not one of the relational database domains that stores the management
configuration?

  • A. User Domain
  • B. System Domain
  • C. Global Domain
  • D. Audit Domain
Mark Question:
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

What file extension should be used with fw monitor to allow the output file to be imported and read
in Wireshark?

  • A. .cap
  • B. .exe
  • C. .tgz
  • D. .pcap
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

Where will the usermode core files located?

  • A. /var/log/dump/usermode
  • B. /var/suroot
  • C. $FWDIR/var/log/dump/usermode
  • D. $CPDIR/var/log/dump/usermode
Mark Question:
Answer:

A


Reference:
https://supportcenter.checkpoint.com/supportcenter/portal
?
eventSubmit_doGoviewsolutiondetails=&solutionid=sk92764

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

How often will a gateway with Performance Pack running by default automatically review and
distribute interface affinity between cores?

  • A. Every 60 seconds
  • B. Interface affinity is determined at gateway build time and does not change
  • C. Every 5 minutes
  • D. Every 10 seconds
Mark Question:
Answer:

A


Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_PerformanceTuning_WebAdmin/6731.htm

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

Which of the following features is supported in Check Point’s implementation of IPv6?

  • A. Security Servers
  • B. QoS
  • C. ClusterXL High Availability
  • D. SAM
Mark Question:
Answer:

C


Reference:
https://supportcenter.checkpoint.com/supportcenter/portal
?
eventSubmit_doGoviewsolutiondetails=&solutionid=sk39374

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

You verified that Performance Pack is disabled and need to distribute the affinity interfaces. What
command would you run to use static affinity to balance the interfaces between the SND cores?

  • A. cpmq set
  • B. sim affinity -s
  • C. fw ctl affinity -a -l -v
  • D. fw ctl affinity -s
Mark Question:
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

Which command would you use to check CoreXL instances for IPv6 traffic?

  • A. fwaccel6 stats
  • B. fwaccel6 stat
  • C. fw ctl multik stat
  • D. fw6ctl multik stat
Mark Question:
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

What must be done for the “fw monitor” command to capture packets through the firewall kernel?

  • A. SecureXL must be disabled
  • B. ClusterXL must be temporarily disabled
  • C. Firewall policy must be re-installed
  • D. The output file must be transferred to a machine with WireShark
Mark Question:
Answer:

A


Reference:
https://supportcenter.checkpoint.com/supportcenter/portal
?
eventSubmit_doGoviewsolutiondetails=&solutionid=sk30583

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

Consider a Check Point Security Gateway under high load. What mechanism can be used to confirm
that important traffic such as control connections are not dropped?

  • A. fw debug fgd50 on OPSEC_DEBUG_LEVEL=3
  • B. fw ctl multik prioq
  • C. fgate –d load
  • D. fw ctl debug –m fg all
Mark Question:
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

What is the default and maximum number of entries in the ARP Cache Table in a Check Point
appliance?

  • A. 1,024 and 4,096
  • B. 4,096 and 16,384
  • C. 4,096 and 65,536
  • D. 1,024 and 16,384
Mark Question:
Answer:

D


Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_Gaia_WebAdmin/73181.htm

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

Which kernel debug flag should you use to troubleshoot NAT connections?
A. fw ctl debug + xlate xltrc nat table
B. fw ctl debug + xltrc xlate nat conn
C. fw ctl debug + xlate xltrc nat conn drop
D. fw ctl debug + fwx_alloc nat conn drop

Mark Question:
Answer:

C
(none)
Explanation

Discussions
0 / 1000

Question 15

You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify
security administration, which action would you choose?

  • A. Eliminate all possible contradictory rules such as the Stealth or Cleanup rules
  • B. Create a separate Security Policy package for each remote Security Gateway
  • C. Create network objects that restrict all applicable rules to only certain networks
  • D. Run separate SmartConsole instances to login and configure each Security Gateway directly
Mark Question:
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2