Month End Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Checkpoint 156-587 Dumps Questions Answers

Page: 1 / 6
Total 101 questions

Check Point Certified Troubleshooting Expert - R81.20 (CCTE) Questions and Answers

Question 1

You modified kernel parameters and after rebooting the gateway, a lot of production traffic gets dropped and the gateway acts strangely What should you do"?

Options:

A.

Run command fw ctl set int fw1_kernel_all_disable=1

B.

Restore fwkem.conf from backup and reboot the gateway

C.

run fw unloadlocal to remove parameters from kernel

D.

Remove all kernel parameters from fwkem.conf and reboot

Buy Now
Question 2

How many packets are needed to establish IKEv1?

Options:

A.

Only three packets for main mode

B.

8

C.

5

D.

6

Question 3

When a user space process or program suddenly crashes, what type of file is created for analysis

Options:

A.

core dump

B.

kernel_memory_dump dbg

C.

core analyzer

D.

coredebug

Question 4

You receive reports from multiple users that they cannot browse Upon further discovery you identify that Identity Awareness cannot identify the users properly and apply the configuredAccess Roles

What commands you can use to troubleshoot all identity collectors and identity providers from the command line?

Options:

A.

on the gateway:pdp debug set IDC all IDP all

B.

on the gateway:pdp debug set AD all and IDC all

C.

on the management:pdp debug on IDC all

D.

on the management: pdp debug set all

Question 5

When a User Mode process suddenly crashes,it may create a core dump file.Which of the following information is available in the core dump and may be used to identify the root cause of the crash?

i. Program Counter

ii. Stack Pointer

iii. Memory management information

iv. Other Processor and OS flags / information

Options:

A.

iii and iv only

B.

i and ii only

C.

i, ii, iii and iv

D.

Only lii

Question 6

The Unified Access Control policy eliminates the need to maintain policies for different access control features However, you need to start a general debug of the Unified Policy with all flags turned on Which of the following is the correct syntax?

Options:

A.

fw ctl debug -m UP all

B.

fw ctl debug -m UP + all flags

C.

fw ctl kdebug -m UP all

D.

fwm ctl debug -m UP all

Question 7

How can you start debug of the Unified Policy with all possible flags turned on?

Options:

A.

fw ctl debug -m fw + UP

B.

fw ctl debug -m UP all

C.

fw ctl debug -m UP *

D.

fw ctl debug -m UnifiedPolicy all

Question 8

What is the benefit of fw ctl debug over fw ctl zdebug?

Options:

A.

There is no difference Both are used for debugging kernel

B.

You don't need timestamps

C.

It allows you to debug multiple modules at the same time

D.

You only need 1MB buffer

Question 9

Which of the following commands can be used to see the list of processes monitored by the Watch Dog process?

Options:

A.

cpstat fw -f watchdog

B.

fw ctl get str watchdog

C.

cpwd_admin list

D.

ps -ef | grep watchd

Question 10

Which of the following is a component of the Context Management Infrastructure used to collect signatures in user space from multiple sources such as Application Control and IPS. and compiles them together into unified Pattern Matchers?

Options:

A.

Context Loader

B.

PSL - Passive Signature Loader

C.

cpas

D.

CMI Loader

Question 11

Like a Site-to-Site VPN between two Security Gateways, a Remote Access VPN relies on the Internet Key Exchange (IKE) what types of keys are generated by IKE during negotiation?

Options:

A.

Produce a symmetric key on both sides

B.

Produce an asymmetric key on both sides

C.

Symmetric keys based on pre-shared secret

D.

Produce a pair of public and private keys

Question 12

You need to run a kernel debug over a longer period of time as the problem occurs only once or twice a week. Therefore you need to add a timestamp to the kernel debug and write the output to a file

but you cant afford to fill up all the remaining disk space and you only have 10 GB free for saving the debugs What is the correct syntax for this?

Options:

A.

A fw ctl kdebug -T -f -m 10 -s 1000000 -o debugfilename

B.

fw ctl debug -T -f-m 10 -s 1000000 -o debugfilename

C.

fw ctl kdebug -T -f -m 10 -s 1000000 > debugfilename

D.

fw ctl kdebug -T -m 10 -s 1000000 -o debugfilename

Question 13

You need to run a kernel debug over a longer period of time as the problem occurs only once or twice a week Therefore you need to add a timestamp to the kernel debug and write the output to a file.What is the correct syntax for this?

Options:

A.

fw ctl debug -T -f > filename debug

B.

fw ctl kdebug -T -f -o filename debug

C.

fw ell kdebug -T > filename debug

D.

fw ctl kdebug -T -f > filename.debug

Question 14

Which command is used to write a kernel debug to a file?

Options:

A.

fw ctl kdebug -T -I > debug.txt

B.

fw ctl debug -S -t > debug.txt

C.

fw ctl kdebug -T -f > debug.txt

D.

fw ctl debut -T -f > debug.txt

Question 15

What is correct about the Resource Advisor (RAD) service on the Security Gateways?

Options:

A.

RAD is not a separate module, it is an integrated function of the‘fw’kernel module and does all operations in the kernel space

B.

RAD functions completely in user space The Pattern Matter (PM) module of the CMI looks up for URLs in the cache and if not found, contact the RAD process in user space to do onlinecategorization

C.

RAD is completely loaded as a kernel module that looks up URL in cache and if not found connects online for categorization There is no user space involvement in this process

D.

RAD has a kernel module that looks up the kernel cache notifies client about hits and misses and forwards a-sync requests to RAD user space modulewhich is responsible for onlinecategorization

Question 16

What is the correct syntax to set all debug flags for Unified Policy related issues?

Options:

A.

fw ctl kdebug-m UP all

B.

fw ctl debug-m UP all

C.

fw ctl debug -m up all

D.

fw ctl debug -m fw all

Question 17

What does CMI stand for in relation to the Access Control Policy?

Options:

A.

Context Manipulation Interface

B.

Context Management Infrastructure

C.

Content Management Interface

D.

Content Matching Infrastructure

Question 18

What is NOT a benefit of the‘fw ctl zdebug’command?

Options:

A.

Automatically allocate a 1MB buffer

B.

Collect debug messages from the kernel

C.

Cannot be used to debug additional modules

D.

Clean the buffer

Question 19

What function receives theAD log event information?

Options:

A.

FWD

B.

CPD

C.

PEP

D.

ADLOG

Question 20

Check Point Access Control Daemons contains several daemons for Software Blades and features.Which Daemon is used forApplication & Control URL Filtering?

Options:

A.

pdpd

B.

rad

C.

cprad

D.

pepd

Question 21

Packet processing infrastructure consists of the following components EXCEPT:

Options:

A.

Observers

B.

Manager

C.

Client

D.

Classifiers

Question 22

What clicommand is run on the GW to verifycommunication to the identity Collector?

Options:

A.

pdp connections idc

B.

pep connections idc

C.

show idc connections

D.

fwd connected

Question 23

When viewing data for CPMI objects in the Postgres database, what table column should be selected to query for the object instance?

Options:

A.

CpmiHostCkp

B.

fwset

C.

CPM Global M

D.

GuiDBedit

Page: 1 / 6
Total 101 questions