New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

CCSM 156-115.80 Book

Page: 3 / 6
Total 159 questions

Check Point Certified Security Master - R80 Questions and Answers

Question 9

Which command(s) can be used to set up 5 core files per process?

Options:

A.

set core-dump per_process 5 save config

B.

set core-dump per_process amount = 5 save config

C.

set core-dump per_process 5

D.

add core-dump per_process 5 save config

Question 10

When dealing with monolithic operating systems such as Gaia, where are system calls initiated from to achieve a required system level function?

Options:

A.

Slow Path

B.

Medium Path

C.

Kernel Mode

D.

User Mode

Question 11

During firewall kernel debug with fw ctl zdebug you received less information than expected. You noticed that a lot of messages were lost since the time the debug was started. What should you do to resolve this issue?

Options:

A.

Increase debug buffer; Use fw ctl debug –buf 32768

B.

Redirect debug output to file; Use fw ctl zdebug –o ./debug.elg

C.

Increase debug buffer; Use fw ctl zdebug –buf 32768

D.

Redirect debug output to file; Use fw ctl debug –o ./debug.elg

Question 12

What is the name of the table that an administrator would review to investigate a port exhaustion error when using Hide NAT?

Options:

A.

dyn_nat_table

B.

connection

C.

nat_dyn_table

D.

fwx_alloc

Page: 3 / 6
Total 159 questions