Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Checkpoint 156-587 Dumps Questions Answers

Page: 1 / 8
Total 109 questions

Check Point Certified Troubleshooting Expert - R81.20 (CCTE) Questions and Answers

Question 1

You want to fully investigate the VPN establishment, what will you do?

Options:

A.

vpn debug and use IKEview

B.

debug FWD because VPND Is child process

C.

use vpn tu command and use option 8 to start debug

D.

use kernel debug with fw ctl debug -m VPN all

Buy Now
Question 2

What command(s) will turn off all vpn debug collection?

Options:

A.

vpn debug -a off

B.

fw ctl debug 0

C.

vpn debug off

D.

vpn debug off and vpn debug Ikeoff

Question 3

What Check Point process controls logging?

Options:

A.

FWD

B.

CPVVD

C.

CPM

D.

CPD

Question 4

Your users are having trouble opening a Web page and you need to troubleshoot it. You open the Smart Console, and you get the following message when you navigate to the Logs and Monitor "SmartLog is not active or Failed to parse results from server". What is the first thing you can try to resolve it?

Options:

A.

Run the commands on the SMS: smartlogstart and smartlogstop

B.

smartlog debug on and smartlog debug off

C.

smartlog_server restart

D.

cpmstop and cpmstart

Question 5

How does Identity Collector connect to Windows Server?

Options:

A.

ADQuery is needed for connection

B.

LDAP connection

C.

It uses a PDP demon to connect

D.

via Windows API

Question 6

You do not see logs in the SMS. When you login on the SMS shell and run cpwd_admin list you notice that the RFL process is with status T. What command can you run to try to resolve it?

Options:

A.

RFLstop and RFLstart

B.

evstart and evstop

C.

smartlog_server stop and smartlog_server restart

D.

rflsop and rflstart

Question 7

The management configuration stored in the Postgres database is partitioned into several relational database domains. What is the purpose of the Global Domain?

Options:

A.

Global Domains is used by the IPS software blade to map the IDs to the corresponding countries according to the IpToCountry.csv file.

B.

This domain is used as the global database to back up the objects referencing the corresponding object attributes from the System Domain.

C.

This domain is used as the global database to track the changes made by multiple administrators on the same objects prior to publishing.

D.

This domain is used as the global database for MDSM and contains global objects and policies.

Question 8

Which of the following daemons is used for Threat Extraction?

Options:

A.

extractd

B.

tedex

C.

tex

D.

scrubd

Question 9

When a User process or program suddenly crashes, a core dump is often used to examine the problem Which command is used to enable the core-dumping via GAIA clish?

Options:

A.

set core-dump enable

B.

set core-dump total

C.

set user-dump enable

D.

set core-dump per_process

Question 10

You need to run a kernel debug over a longer period of time as the problem occurs only once or twice a week. Therefore you need to add a timestamp to the kernel debug and write the output to a file

but you cant afford to fill up all the remaining disk space and you only have 10 GB free for saving the debugs What is the correct syntax for this?

Options:

A.

A fw ctl kdebug -T -f -m 10 -s 1000000 -o debugfilename

B.

fw ctl debug -T -f-m 10 -s 1000000 -o debugfilename

C.

fw ctl kdebug -T -f -m 10 -s 1000000 > debugfilename

D.

fw ctl kdebug -T -m 10 -s 1000000 -o debugfilename

Question 11

Which of these packet processing components stores Rule Base matching state-related information?

Options:

A.

Classifiers

B.

Manager

C.

Handlers

D.

Observers

Question 12

What is the proper command for allowing the system to create core files?

Options:

A.

service core-dump start

B.

SFWDIR/scripts/core-dump-enable.sh

C.

set core-dump enable

>save config

D.

# set core-dump enable

# save config

Question 13

The Check Point Firewall Kernel is the core component of the Gaia operating system and an integral part of traffic inspection process. There are two procedures available for debugging the firewall kernel. Which procedure/command is used for detailed troubleshooting and needs more resources?

Options:

A.

fw ctl zdebug

B.

fw debug/kdebug

C.

fw ctl debug/kdebug

D.

fw debug/kdebug ctl

Question 14

Troubleshooting issues with Mobile Access requires the following:

Options:

A.

'ma_vpnd' process on Security Gateway

B.

Debug logs of FWD captured with the command - ‘fw debug fwd on TDERROR_MOBILE_ACCESS=5'

C.

Standard VPN debugs, packet captures and debugs of cvpnd1 process on Security Gateway

D.

Standard VPN debugs and packet captures on Security Gateway, debugs of 'cvpnd' process on Security Management

Question 15

Which of the following would NOT be a flag when debugging a unified policy?

Options:

A.

tls

B.

rulebase

C.

clob

D.

connection

Question 16

RAD is initiated when Application Control and URL Filtering blades are active on the Security Gateway. What is the purpose of the following RAD configuration file $FWDIR/conf/rad_settings.C?

Options:

A.

This file contains the location information for Application Control and/or URL Filtering entitlements

B.

This file contains the information on how the Security Gateway reaches the Security Management Server's RAD service for Application Control and URL Filtering

C.

This file contains RAD proxy settings

D.

This file contains all the host name settings for the online application detection engine

Question 17

What file contains the RAD proxy settings?

Options:

A.

rad_control.C

B.

rad_scheme.C

C.

rad_services.C

D.

rad_settings.C

Question 18

You run a free-command on a gateway and notice that the Swap column is not zero Choose the best answer

Options:

A.

Utilization of ram is high and swap file had to be used

B.

Swap file is used regularly because RAM memory is reserved for management traffic

C.

Swap memory is used for heavy connections when RAM memory is full

D.

Its ole Swap is used to increase performance

Question 19

You receive complains that Guest Users cannot login and use the Guest Network which is configured with Access Role of Guest Users. You need to verity the Captive Portal configuration. Where can

you find the config file?

Options:

A.

on the gateway at $NACPORTAL_ HOME/conf/httpd_ nac.conf

B.

on the management at SCPNAC_ HOME/conf/httpd_ nac.conf

C.

on the management at SNACPORTAL_ HOME/conf/httpd_ nac.conf

D.

on the gateway at $CPNAC_ HOME/conf/httpd_ nac.conf

Question 20

What does CMI stand for in relation to the Access Control Policy?

Options:

A.

Context Manipulation Interface

B.

Context Management Infrastructure

C.

Content Management Interface

D.

Content Matching Infrastructure

Question 21

When viewing data for CPMI objects in the Postgres database, what table column should be selected to query for the object instance?

Options:

A.

CpmiHostCkp

B.

fwset

C.

CPM Global M

D.

GuiDBedit

Question 22

What command would you run to verify the communication between the Security Gateway and the Identity Collector?

Options:

A.

fw ctl debug -m IDAPI

B.

pdp connections idc

C.

fw ctl debug -m fw + nac

D.

adlog

Question 23

What is the benefit of fw ctl debug over fw ctl zdebug?

Options:

A.

There is no difference Both are used for debugging kernel

B.

You don't need timestamps

C.

It allows you to debug multiple modules at the same time

D.

You only need 1MB buffer

Question 24

Check Point Access Control Daemons contains several daemons for Software Blades and features. Which Daemon is used for Application & Control URL Filtering?

Options:

A.

pdpd

B.

rad

C.

cprad

D.

pepd

Question 25

What are the three main component of Identity Awareness?

Options:

A.

Client, SMS and Secure Gateway

B.

Identity Source Identity Server (POP) and Identity Enforcement (PEP)

C.

Identity Awareness Blade on Security Gateway, User Database on Security Management Server and Active Directory

D.

User, Active Directory and Access Role

Question 26

What is NOT a benefit of the ‘fw ctl zdebug’ command?

Options:

A.

Automatically allocate a 1MB buffer

B.

Collect debug messages from the kernel

C.

Cannot be used to debug additional modules

D.

Clean the buffer

Question 27

You receive reports that Users cannot browse internet sites. You are using identity awareness with AD Query and Identity Collector in addition you have the Browser Based Authentication Enabled. What command can be used to debug the problem?

Options:

A.

on the gateway: ad debug on

B.

on the gateway: ad query debug on

C.

on the management: ad query debug extended

D.

on the gateway: pdp debug nac extended

Question 28

What function receives the AD log event information?

Options:

A.

FWD

B.

CPD

C.

PEP

D.

ADLOG

Question 29

If SmartLog is not active or failed to parse results from server, what commands can be run to re-enable the service?

Options:

A.

smartlogrestart and smartlogstart

B.

smartlogstart and smartlogstop

C.

smartloginit and smartlogstop

D.

smartlogstart and smartlogsetup

Question 30

An administrator receives reports about issues with log indexing and text searching regarding an existing Management Server. In trying to find a solution she wants to check if the process responsible for this feature is running correctly. What is true about the related process?

Options:

A.

cpd needs to be restarted manual to show in the list

B.

fwm manaqes this database after initialization of the 1CA

C.

solr is a child process of cpm

D.

fwssd crashes can affect therefore not show in the list

Question 31

The packet processing infrastructure consists of 4 components. Which component contains the CLOB, the object that contains information about the packet that is needed to make security decisions?

Options:

A.

Manager

B.

Classifiers

C.

Handlers

D.

Observers

Question 32

What is the correct syntax to turn a VPN debug on and create new empty debug files'?

Options:

A.

vpndebug trunc on

B.

vpn debug truncon

C.

vpn debug trunkon

D.

vpn kdebug on

Page: 1 / 8
Total 109 questions