What is the difference between "connection establishment acceleration" (templating) and "traffic acceleration"?
A. These are the same technologies with different names.
B. "Connection establishment acceleration" only accelerates a single connection, while "traffic acceleration" accelerates similar traffic.
C. "Traffic acceleration" is accelerated through hardware, and "connection establishment acceleration" is accelerated in software.
D. "Traffic acceleration" only accelerates a single connection, while "connection establishment acceleration" accelerates similar traffic.
What will be the outcome if you set the kernel parameters cphwd_nat_templates_enabled and cphwd_nat_templates_support?
A. This would enable Hide NAT support.
B. These parameters are mutually exclusive and cannot be used at the same time.
C. This would enable SecureXL NAT templates.
D. These are not valid parameters.
You are finding that some users are complaining about slow connection speed. You would like to review a summary of your connections, including which connections are accelerated and those that are not. What command could you use?
A. fw ctl pstat
B. fwaccel perf
C. fw tab -t connections -s
D. fwaccel stats -s
You want to verify that the majority of your connections are being optimized by SecureXL. What command would you run to establish this information?
A. fw ctl pstat
B. fw tab -t connections -s
C. fwaccel conns -s
D. sim_dbg -s
You have a requirement to implement a strict security policy. With this in mind, you must create a stealth rule. How will this impact your packet acceleration?
A. Using a stealth rule disables SecureXL.
B. There will be no impact as long as the rule is not logged.
C. NAT templates will not work.
D. There will be no impact, since stealth rules do not affect SecureXL.
Under which scenario would you most likely consider the use of Multi-Queue?
A. When IPS is heavily used.
B. When most of the traffic is accelerated.
C. When most of the processing is done in CoreXL.
D. When trying to increase session rate.
If you need to use a Domain object in the Rule Base, where should this rule be located?
A. No higher than the 2nd rule.
B. The first rule in the Rule Base.
C. The last rule before the clean up rule.
D. The last rule after the clean up rule.
Your company has grown significantly over the past few months. You are seeing that new connections are being dropped but note that the connections table is not full. You suspect that the kernel memory allocated to the firewall has reached its full capacity. To check the "Machine Capacity Summary" statistics, you use command:
A. ps -aux
B. top
C. cat /proc/net/capacity
D. fw ctl pstat
Which of the following is a valid synchronization status as an output to fw ctl pstat?
A. Unable to receive sync packets
B. Sync member down
C. Synchronized
D. Communicating
You are running some diagnostics on your GAIA gateway. You are reviewing the number of fragmented packets; you notice that there are a lot of large and duplicate packets. Which command did you issue to get this information?
A. sysconfig
B. fw ctl pstat
C. fw ctl get int fw_frag_stats
D. cat /proc/cpuinfo
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CheckPoint exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 156-115.77 exam preparations and CheckPoint certification application, do not hesitate to visit our Vcedump.com to find your solutions here.