Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Selected 156-587 CCTE Questions Answers

Page: 4 / 8
Total 109 questions

Check Point Certified Troubleshooting Expert - R81.20 (CCTE) Questions and Answers

Question 13

The Check Point Firewall Kernel is the core component of the Gaia operating system and an integral part of traffic inspection process. There are two procedures available for debugging the firewall kernel. Which procedure/command is used for detailed troubleshooting and needs more resources?

Options:

A.

fw ctl zdebug

B.

fw debug/kdebug

C.

fw ctl debug/kdebug

D.

fw debug/kdebug ctl

Question 14

Troubleshooting issues with Mobile Access requires the following:

Options:

A.

'ma_vpnd' process on Security Gateway

B.

Debug logs of FWD captured with the command - ‘fw debug fwd on TDERROR_MOBILE_ACCESS=5'

C.

Standard VPN debugs, packet captures and debugs of cvpnd1 process on Security Gateway

D.

Standard VPN debugs and packet captures on Security Gateway, debugs of 'cvpnd' process on Security Management

Question 15

Which of the following would NOT be a flag when debugging a unified policy?

Options:

A.

tls

B.

rulebase

C.

clob

D.

connection

Question 16

RAD is initiated when Application Control and URL Filtering blades are active on the Security Gateway. What is the purpose of the following RAD configuration file $FWDIR/conf/rad_settings.C?

Options:

A.

This file contains the location information for Application Control and/or URL Filtering entitlements

B.

This file contains the information on how the Security Gateway reaches the Security Management Server's RAD service for Application Control and URL Filtering

C.

This file contains RAD proxy settings

D.

This file contains all the host name settings for the online application detection engine

Page: 4 / 8
Total 109 questions