Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

156-115.80 Questions and Answers

Note! Following 156-115.80 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

156-115.80 Questions and Answers

Question # 6

You have configured IPS Bypass Under Load function with additional kernel parameters: ids_tolerance_no_stress=15 and ids_tolerance_stress=15. For configuration you used the “fw ctl set” command. After reboot you noticed that these parameters returned to their default values. What do you need to do to make this configuration work immediately and stay permanent?

A.

Set these parameters again with “fw ctl set” and edit appropriate parameters in $FWDIR/boot/modules/ fwkern.conf

B.

Use script $FWDIR/bin IpsSetBypass.sh to set these parameters

C.

Set these parameters again with “fw ctl set” and save configuration with “save config”

D.

Edit appropriate parameters in $FWDIR/boot/modules/fwkern.conf

Full Access
Question # 7

You issued the command “set ipv6-state on” in order to enable IPv6 protocol on a Security Gateway. The command was executed successfully. After reboot you notice that IPv6 protocol is not enabled. What do you do to permanently enable IPv6 protocol?

A.

Issue “set ipv6-state on” again; Save configuration and reboot

B.

You need to modify Gateway Properties in SmartConsole and install policy in order to enable IPv6

C.

You need to set “ipv6_state” parameter in $FWDIR/boot/modules/fwkern.conf and reboot

D.

You need to install a valid license to use IPv6 protocol

Full Access
Question # 8

How many layers are incorporated in IPS detection and what are they called?

A.

4 layers – Passive Streaming Library (PSL), Protocol Parsers, Context Management, Protections

B.

3 layers – Active Streaming Library (ASL), CMI, Protections

C.

4 layers – Active Streaming Library (ASL), Protocol Parsers, Context Management, Protections

D.

3 layers – Protocol Parsers, CMI, Protections

Full Access
Question # 9

Which one of following commands should you run to display HTTPS packet content together with kernel debug?

A.

fw ctl get int https_inspection_show_decrypted_data_in_debug=1 fw ctl get int ssl_inspection_extra_debug=1

B.

fw set int https_inspection_get_encrypted_data_in_debug 1 fw set int https_inspection_show_debug 1

C.

fw ctl set int https_inspection_show_decrypted_data_in_debug 1 fw ctl set int ssl_inspection_extra_debug 1

D.

fw ctl set int http_inspection_display_encrypted_data_in_debug=1 fw ctl set int http_inspection_extra_debug=1

Full Access
Question # 10

Which of the following is NOT a vpn debug command used for troubleshoot?

A.

fw ctl debug –m fw + conn drop vm crypt

B.

vpn debug trunc

C.

mpclient getdata sslvpn

D.

vpn debug on TDERROR_ALL_ALL=5

Full Access
Question # 11

Which file would you need to make sure you collect when debugging a VPN that fails to establish that is configured to use IKEv2?

A.

$FWDIR/log/ike2.elg

B.

$FWDIR/log/vpnd.xml.v2

C.

$FWDIR/log/ikev2.xml

D.

$CPDIR/log/ike.elg

Full Access
Question # 12

The fw monitor output file type is?

A.

Binary

B.

ASCII text

C.

ZIP

D.

tar.gzip

Full Access
Question # 13

What is enabled by the command “vpn debug mon”?

A.

statistics monitoring for vpn encrypted packets

B.

vpn daemon monitor mode

C.

ike monitor

D.

vpn debug mode

Full Access
Question # 14

When debugging object configurations in SmartConsole, which new Windows Environment Variable must be added?

A.

EMBEDDED_SDB_LOG

B.

EMBEDDED_CPSC_LOG

C.

EMBEDDED_DBS_log

D.

EMBEDDED_SCDB_LOG

Full Access
Question # 15

Where will the command, “fw monitor -pi -vpn”, be inserted into the fw ctl chain?

A.

Before the Fw VM inbound

B.

Before the vpn module

C.

After the Fw VM outbound

D.

After the vpn module

Full Access
Question # 16

The pepd and pdpd daemons are used by which Software blade?

A.

Identity Awareness

B.

DLP

C.

URL Filtering

D.

Application Control

Full Access
Question # 17

Which command should be used to insert fw monitor before secxl_sync module?

A.

fw monitor –pi –secxl_sync –o capture.cap

B.

fw monitor –pl –secxl_sync –o capture.cap

C.

fw monitor –pO –secxl_sync –o capture.cap

D.

fw monitor –e “accept –pi –secxl_sync;” –o capture.cap

Full Access
Question # 18

You are about to add an IPv6 address to an interface with CLISH, but the system generates a message stating that the command is unknown. What could be the reason of this behavior?

A.

You have to install the IPv6 SKU license onto your Security Gateway

B.

You must activate the IPv6 protocol stack with the “set ipv6-state on” command in CLISH

C.

You have to tick the IPv6 check box under the topology section of your gateway object within SmartConsole

D.

You have to install the IPv6 SKU license onto your Security Management Server

Full Access
Question # 19

You have configured SecureXL NAT templates with the “fw ctl set” command. You check configuration and ensure that NAT templates were enabled. After an accidental reboot, you issue “fwaccel stat” and noticed that NAT Templates are not enabled. You need to permanently enable SecureXL NAT templates. What should you do?

A.

Set NAT Templates with “fwaccel templates NAT” command and save configuration with “save config”

B.

Enable NAT Templates again with “fw ctl set” and save configuration with “save config”

C.

Enable NAT Templates again with “fw ctl set” and edit appropriate parameters in $FWDIR/boot/modules/

fwkern.conf

D.

Edit appropriate parameters in $FWDIR/boot/modules/fwkern.conf

Full Access
Question # 20

Which daemon is used for Geo protection?

A.

in.geod

B.

cphamcset

C.

fwd

D.

cpd

Full Access
Question # 21

By default, how long does the UDP connection remain on the state table?

A.

30 Seconds

B.

30 minutes

C.

60 minutes

D.

40 Seconds

Full Access
Question # 22

John works for ABC Corporation. His manager wants him to analyze the previous day’s resource usage on the firewall. John decides to use cpview. John knows that, by default cpview history enabled but he wants to verify whether someone has disabled it. Which command should John use to verify whether cpview history is enabled?

A.

cpview status

B.

cpstat

C.

cpview history stat

D.

cpview info

Full Access
Question # 23

Which of the following is NOT a special consideration while running fw monitor on production firewall?

A.

While executing fw monitor, you need to specify an expression so that it captures the required traffic instead of all traffic

B.

While running fw monitor on a busy firewall, the –ci and –co switches can be used to limit the number of packets captured

C.

While running fw monitor, it resets all the debug flags

D.

During a fw monitor, the firewall will have to process more packets because SecureXL acceleration should be disabled

Full Access