Month End Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Legit 156-587 Exam Download

Page: 3 / 6
Total 101 questions

Check Point Certified Troubleshooting Expert - R81.20 (CCTE) Questions and Answers

Question 9

Which of the following commands can be used to see the list of processes monitored by the Watch Dog process?

Options:

A.

cpstat fw -f watchdog

B.

fw ctl get str watchdog

C.

cpwd_admin list

D.

ps -ef | grep watchd

Question 10

Which of the following is a component of the Context Management Infrastructure used to collect signatures in user space from multiple sources such as Application Control and IPS. and compiles them together into unified Pattern Matchers?

Options:

A.

Context Loader

B.

PSL - Passive Signature Loader

C.

cpas

D.

CMI Loader

Question 11

Like a Site-to-Site VPN between two Security Gateways, a Remote Access VPN relies on the Internet Key Exchange (IKE) what types of keys are generated by IKE during negotiation?

Options:

A.

Produce a symmetric key on both sides

B.

Produce an asymmetric key on both sides

C.

Symmetric keys based on pre-shared secret

D.

Produce a pair of public and private keys

Question 12

You need to run a kernel debug over a longer period of time as the problem occurs only once or twice a week. Therefore you need to add a timestamp to the kernel debug and write the output to a file

but you cant afford to fill up all the remaining disk space and you only have 10 GB free for saving the debugs What is the correct syntax for this?

Options:

A.

A fw ctl kdebug -T -f -m 10 -s 1000000 -o debugfilename

B.

fw ctl debug -T -f-m 10 -s 1000000 -o debugfilename

C.

fw ctl kdebug -T -f -m 10 -s 1000000 > debugfilename

D.

fw ctl kdebug -T -m 10 -s 1000000 -o debugfilename

Page: 3 / 6
Total 101 questions