Summer Special Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 60certs

Checkpoint 156-585 Dumps

Page: 1 / 4
Total 114 questions

Check Point Certified Troubleshooting Expert Questions and Answers

Question 1

Check Point provides tools & commands to help you to identify issues about products and applications. Which Check Point command can help you to display status and statistics information for various Check Point products and applications?

Options:

A.

cpstat

B.

CPstat

C.

CPview

D.

fwstat

Question 2

For TCP connections, when a packet arrives at the Firewall Kernel out of sequence or fragmented, which layer of IPS corrects this to allow for proper inspection?

Options:

A.

Passive Streaming Library

B.

Protections

C.

Protocol Parsers

D.

Context Management

Question 3

How can you start debug of the Unified Policy with all possible flags turned on?

Options:

A.

fw ctl debug -m UP all

B.

fw ctl debug -m UnifiedPolicy all

C.

fw ctl debug -m fw + UP

D.

fw ctl debug -m UP *

Question 4

How can you increase the ring buffer size to 1024 descriptors?

Options:

A.

set interface eth0 rx-ringsize 1024

B.

fw ctl int rx_ringsize 1024

C.

echo rx_ringsize=1024>>/etc/sysconfig/sysctl.conf

D.

dbedit>modify properties firewall_properties rx_ringsize 1024

Question 5

What command is used to find out which port Multi-Portal has assigned to the Mobile Access Portal?

Options:

A.

mpclient getdata sslvpn

B.

netstat -nap | grep mobile

C.

mpclient getdata mobi

D.

netstat getdata sslvpn

Question 6

Vanessa is reviewing ike.elg file to troubleshoot failed site-to-site VPN connection After sending Mam Mode Packet 5 the response from the peer is PAYLOAD-MALFORMED"

What is the reason for failed VPN connection?

Options:

A.

The authentication on Phase 1 is causing the problem.

Pre-shared key on local gateway encrypted by the hash algorithm created in Packet 3 and Packet 4 doesn't match with the hash on the peer gateway generated by encrypting its pre-shared key

B.

The authentication on Phase 2 is causing the problem

Pre-shared key on local gateway encrypted by the hash algorithm created in Packets 1 and 2 doesn't match with the hash on the peer gateway generated by encrypting its pre-shared key

C.

The authentication on Quick Mode is causing the problem

Pre-shared key on local gateway encrypted by the hash algorithm created in Packets 3 and 4 doesn't match with the hash on the peer gateway generated by encrypting its pre-shared key

D.

The authentication on Phase 1 is causing the problem

Pre-shared key on local gateway encrypted by the hash algorithm doesn't match with the hash on the peer gateway generated by encrypting its pre-shared key created in Packet 1 and Packet 2

Question 7

Which command can be run in Expert mode lo verify the core dump settings?

Options:

A.

grep cdm /config/db/coredump

B.

grep cdm /config/db/initial

C.

grep SFWDlR/config/db/initial

D.

cat /etc/sysconfig/coredump/cdm conf

Question 8

Which file is commonly associated with troubleshooting crashes on a system such as the Security Gateway?

Options:

A.

core dump

B.

CPMIL dump

C.

fw monitor

D.

tcpdump

Question 9

What is the function of the Core Dump Manager utility?

Options:

A.

To generate a new core dump for analysis

B.

To limit the number of core dump files per process as well as the total amount of disk space used by core files

C.

To determine which process is slowing down the system

D.

To send crash information to an external analyzer

Question 10

The Check Pom! Firewall Kernel is the core component of the Gaia operating system and an integral part of the traffic inspection process There are two procedures available for debugging the firewall kernel Which procedure/command is used for troubleshooting packet drops and other kernel activites while using minimal resources (1 MB buffer)?

Options:

A.

fw ctl zdebug

B.

fw ctl debug/kdebug

C.

fwk ctl debug

D.

fw debug ctl

Question 11

VPN issues may result from misconfiguration, communication failure, or incompatible default configurations between peers Which basic command syntax needs to be used for troubleshooting Site-to-Site VPN Issues?

Options:

A.

vpn debug truncon

B.

fw debug truncon

C.

cp debug truncon

D.

vpn truncon debug

Question 12

What is the most efficient way to view large fw monitor captures and run filters on the file?

Options:

A.

wireshark

B.

CLISH

C.

CLI

D.

snoop

Question 13

You are running R80.XX on an open server and you see a high CPU utilization on your 12 CPU cores You now want to enable Hyperthreading to get more cores to gain some performance. What is the correct way to achieve this?

Options:

A.

Hyperthreading is not supported on open servers, on on Check Point Appliances

B.

just turn on HAT in the bios of the server and boot it

C.

just turn on HAT in the bios of the server and after it has booted enable it in cpconfig

D.

in dish run set HAT on

Question 14

During firewall kernel debug with fw ctl zdebug you received less information than expected. You noticed that a lot of messages were lost since the time the debug was started. What should you do to resolve this issue?

Options:

A.

Increase debug buffer; Use fw ctl debug –buf 32768

B.

Redirect debug output to file; Use fw ctl zdebug –o ./debug.elg

C.

Increase debug buffer; Use fw ctl zdebug –buf 32768

D.

Redirect debug output to file; Use fw ctl debug –o ./debug.elg

Question 15

What are four main database domains?

Options:

A.

System, Global, Log, Event

B.

System, User, Host, Network

C.

Local, Global, User, VPN

D.

System, User, Global, Log

Question 16

Some users from your organization have been reported some connection problems with CIFS since this morning. You suspect an IPS Issue after an automatic IPS update last night. So you want to perform a packet capture on uppercase I only directly after the IPS module (position 4 in the chain) to check if the packets pass the IPS. What command do you need to run?

Options:

A.

fw monitor -ml -pl 5 -e <filterexpression>

B.

fw monitor -pi 5 -e <filterexpression>

C.

tcpdump -eni any <filterexpression>

D.

fw monitor -pl asm <filterexpression>

Question 17

What acceleration mode utilizes multi-core processing to assist with traffic processing?

Options:

A.

CoreXL

B.

SecureXL

C.

HyperThreading

D.

Traffic Warping

Page: 1 / 4
Total 114 questions