we provide Pinpoint Check Point 156-115.77 dumps which are the best for clearing 156-115.77 test, and to get certified by Check Point Check Point Certified Security Master. The 156-115.77 Questions & Answers covers all the knowledge points of the real 156-115.77 exam. Crack your Check Point 156-115.77 Exam with latest dumps, guaranteed!

Q89. - (Topic 2) 

The fw tab –t ___________ command displays the NAT table. 

A. loglist B. tablist 

C. fwx_alloc 

D. conns 

Answer:


Q90. - (Topic 6) 

You are running an inventory process within your corporate environment (R77) and need to find out CPU, memory, disk space, and information regarding the software blades enabled. What command could you use to easily gather this information? 

A. cpconfig 

B. fw ctl pstat 

C. SmartView Tracker 

D. cpview 

Answer:


Q91. - (Topic 4) 

After disabling SecureXL you ran command fw monitor to help troubleshoot a VPN issue. In your review you note that you only see pre-inbound traffic (“i”) and no other traffic after this. Which of the following reasons could explain this output? 

A. You don’t have an “encrypt” rule 

B. Traffic is not destined to the correct MAC address because you failed to set up proxy ARP 

C. You have overlapping encryption domains with the remote site 

D. Routes are set up incorrectly 

Answer:


Q92. - (Topic 11) 

What considerations are required when configuring IPV6 with Wire mode? 

A. IPv6 in Wire mode is only supported in R77. 

B. IPV6 must be configured on both end points. 

C. IPV6 is not supported in Wire mode. 

D. You must use internal IPv6 addressing space to use Wire mode. 

Answer:


Q93. - (Topic 11) 

You are having issues with dynamic routing after a failover. The traffic is now coming from the backup and is being dropped as out of state. What is the BEST configuration to avoid stateful inspection dropping your dynamic routing traffic? 

A. Implement Wire mode. 

B. In Global Properties select Accept other IP protocols stateful replies for unknown services. 

C. Enable Visitor mode. 

D. Create additional explicit rules. 

Answer:


Q94. - (Topic 2) 

Given the screen configuration shown, the failure’s probable cause is: 

A. Packet 1 Proposes SA life Type , Sa Life Duration, Authentication and Encapsulation Algorithm. 

B. Packet 1 proposes a symmetrical key. 

C. Packet 1 proposes a subnet and host ID, an encryption and hash algorithm. 

D. Packet 1 proposes either a subnet or host ID, an encryption and hash algorithm, and ID data. 

Answer:


Q95. - (Topic 5) 

Look at the follow Rule Base display. Rule 5 contains a TIME object. What is the effect on the following rules? 

A. Rule 6 will be eligible but Rule 7 will not. 

B. All subsequent rules below Rule 5 will not be templated, regardless of the rule 

C. No effect. Rules 6 and 7 will be eligible for templating. 

D. The restriction on one rule does not affect later rules with regards to templates. 

Answer:


Q96. - (Topic 11) 

What is the limit to the number of VPN directions that can be configured in a single rule? 

A. There is no limit. 

B. It is limited to the number of communities that exist in your dashboard. 

C. You may only configure one direction per rule. 

D. After configuring ten you must use a standard bi-directional condition. 

Answer: