Questions for the 156-115-80 were updated on : Dec 01 ,2025
What is the recommended command to manually initiate a failover on a cluster member in HA?
D
Reference:
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_CLI_ReferenceGuide/
Topics-CLIG/CXLG/Initiating-Manual-Cluster-Failover.htm
An administrator is creating a new site-to-site VPN connection. The agreed settings are AES256 and
SHA256. If Elliptic Curve type transforms are required then what can be specifically configured to
achieve this level of security?
B
Reference:
https://supportcenter.checkpoint.com/supportcenter/portal
?
eventSubmit_doGoviewsolutiondetails=&solutionid=sk27054
You are about to add an IPv6 address to an interface with CLISH, but the system generates a message
stating that the command is unknown. What could be the reason of this behavior?
B
The packet processing infrastructure consists of 4 components. Which component contains the CLOB,
the object that contains information about the packet that is needed to make security decisions?
A
What is the command to check the number of CoreXL firewall instances?
B
How would you disable CPM debug?
A
During firewall kernel debug with fw ctl zdebug you received less information than expected. You
noticed that a lot of messages were lost since the time the debug was started. What should you do to
resolve this issue?
A
Reference:
https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/
CP_R80.40_PerformanceTuning_AdminGuide/Content/Topics-PTG/Kernel-Debug/Kernel-Debug-
Procedure.htm
Which command would show you the status of the clustered interfaces as well as the virtual
interfaces?
C
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_ClusterXL_AdminGuide/7298.htm
The customer is using Check Point appliances that were configured long ago by third-party
administrators. Current policy includes different enabled IPS protections and Bypass Under Load
function. Bypass Under Load is configured to disable IPS inspections if CPU and Memory usage is
higher than 80%. The Customer reports that IPS protections are not working at all regardless of CPU
and Memory usage. What is a possible reason of such behavior?
D
What is true about ike.elg file?
C
You have configured SecureXL NAT templates with the “fw ctl set” command. You check configuration
and ensure that NAT templates were enabled. After an accidental reboot, you issue “fwaccel stat”
and noticed that NAT Templates are not enabled. You need to permanently enable SecureXL NAT
templates. What should you do?
B
Which of the following file is commonly associated with troubleshooting crashes on a system such as
the Security Gateway?
A
Which daemon process performs asymmetric key operations for HTTPS Inspection?
D
Reference:
https://supportcenter.checkpoint.com/supportcenter/portal
?
eventSubmit_doGoviewsolutiondetails=&solutionid=sk97638
Regarding the Database Domains, which of the following best describes the System Domain?
A
Reference:
https://www.checkpoint.com/downloads/products/r80.10-security-management-
architecture
- overview.pdf
How would an administrator view the routing table on the Security Gateway of production network
where IPv6 is being used?
A