Month End Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

156-587 Check Point Certified Troubleshooting Expert - R81.20 (CCTE) Questions and Answers

Questions 4

You were asked by security team to debug Mobile Access VPN. What processes will you debug?

Options:

A.

HTTPD and CPVND

B.

IKED

C.

VPND and IKED

D.

SNX daemon

Buy Now
Questions 5

You receive reports that Users cannot browse internet sites. You are using identity awareness with AD Query and Identity Collector in addition you have the Browser Based Authentication Enabled. What command can be used to debug the problem?

Options:

A.

on the gateway: ad debug on

B.

on the gateway: ad query debug on

C.

on the management: ad query debug extended

D.

on the gateway: pdp debug nac extended

Buy Now
Questions 6

You need to monitor traffic pre-inbound and before the VPN module in a Security Gateway. How would you achieve this using fw monitor?

Options:

A.

fw monitor -p all

B.

fw monitor -pi -vpn

C.

fw monitor -pi +vpn

D.

fw monitor -pi +vpn

Buy Now
Questions 7

What is the function of the Core Dump Manager utility?

Options:

A.

To determine which process is slowing down the system

B.

To send crash information to an external analyzer

C.

To limit the number of core dump files per process as well as the total amount of disk space used by core files

D.

To generate a new core dump for analysis

Buy Now
Questions 8

What Check Point process controls logging?

Options:

A.

FWD

B.

CPVVD

C.

CPM

D.

CPD

Buy Now
Questions 9

For Identity Awareness, what is the PDP process?

Options:

A.

Identity server

B.

Log Sifter

C.

Captive Portal Service

D.

UserAuth Database

Buy Now
Questions 10

What is the correct syntax to turn a VPN debug on and create new empty debug files'?

Options:

A.

vpndebug trunc on

B.

vpn debug truncon

C.

vpn debug trunkon

D.

vpn kdebug on

Buy Now
Questions 11

In the Security Management Architecture, what port and process does SmartConsole use to communicate with the Security Management Server?

Options:

A.

CPM and 18190

B.

FWM and 19009

C.

CPM and 19009

D.

CPM, 19009, and 18191

Buy Now
Questions 12

What are the four main database domains?

Options:

A.

Local, Global, User, VPN

B.

System. Global. Log. Event

C.

System, User, Global. Log

D.

System, User, Host, Network

Buy Now
Questions 13

Like a Site-to-Site VPN between two Security Gateways, a Remote Access VPN relies on the Internet Key Exchange (IKE) what types of keys are generated by IKE during negotiation?

Options:

A.

Produce a symmetric key on both sides

B.

Produce an asymmetric key on both sides

C.

Symmetric keys based on pre-shared secret

D.

Produce a pair of public and private keys

Buy Now
Questions 14

PostgreSQL is a powerful, open source relational database management system. Check Point offers a command for viewing the database to interact with Postgres interactive shell. Which command do you need to enter the PostgreSQL interactive shell?

Options:

A.

mysql_client cpm postgres

B.

mysql -u root

C.

psql_client cpm postgres

D.

psql_client postgres cpm

Buy Now
Questions 15

Which kernel process is used by Content Awareness to collect the data from contexts?

Options:

A.

PDP

B.

cpemd

C.

dlpda

D.

CMI

Buy Now
Questions 16

What is the correct syntax to set all debug flags for Unified Policy related issues?

Options:

A.

fw ctl kdebug-m UP all

B.

fw ctl debug-m UP all

C.

fw ctl debug -m up all

D.

fw ctl debug -m fw all

Buy Now
Questions 17

What is the kernel process for Content Awareness that collects the data from the contexts received from the CMI and decides if the file is matched by a data type?

Options:

A.

cntawmod

B.

cntmgr

C.

dlpda

D.

dlpu

Buy Now
Questions 18

Check Point provides tools & commands to help you to identify issues about products and applications. Which Check Point command can help you to display status and statistics information for various Check Point products and applications?

Options:

A.

CPview

B.

cpstat

C.

fwstat

D.

CPstat

Buy Now
Questions 19

Which of these packet processing components stores Rule Base matching state-related information?

Options:

A.

Classifiers

B.

Manager

C.

Handlers

D.

Observers

Buy Now
Questions 20

What tool would you run to diagnose logging and indexing?

Options:

A.

run cpm_doctor.sh

B.

cpstat mg -f log_server

C.

run diagnostic view

D.

run doctor-log.sh

Buy Now
Questions 21

When viewing data for CPMI objects in the Postgres database, what table column should be selected to query for the object instance?

Options:

A.

CpmiHostCkp

B.

fwset

C.

CPM Global M

D.

GuiDBedit

Buy Now
Questions 22

SmartEvent utilizes the Log Server, Correlation Unit and SmartEvent Server to aggregate logs and identify security events. The three main processes that govern these SmartEvent components are:

Options:

A.

cpcu, cplog, cpse

B.

eventiasv, eventiarp,eventiacu

C.

cpsemd, cpsead, and DBSync

D.

fwd, secu, sesrv

Buy Now
Questions 23

URL Filtering is an essential part of Web Security in the Gateway. For the Security Gateway to perform a URL lookup when a client makes a URL request, where is the sync-request forwarded from if a sync-request is required?

Options:

A.

URLF Kernel Client

B.

RAD User Space

C.

RAD Kernel Space

D.

URLF Online Service

Buy Now
Questions 24

Captive Portal, PDP and PEP run in what space?

Options:

A.

User

B.

CPM

C.

FWD

D.

Kernel

Buy Now
Questions 25

What function receives the AD log event information?

Options:

A.

FWD

B.

CPD

C.

PEP

D.

ADLOG

Buy Now
Questions 26

Which command is used to write a kernel debug to a file?

Options:

A.

fw ctl kdebug -T -I > debug.txt

B.

fw ctl debug -S -t > debug.txt

C.

fw ctl kdebug -T -f > debug.txt

D.

fw ctl debut -T -f > debug.txt

Buy Now
Questions 27

Which of the following file is commonly associated with troubleshooting crashes on a system such as the Security Gateway?

Options:

A.

tcpdump

B.

core dump

C.

fw monitor

D.

CPMIL dump

Buy Now
Questions 28

When URL category is not found in the kernel cache, what action will GW do?

Options:

A.

RAD In user space will forward request to the cloud

B.

GW will update kernel cache during next policy install

C.

RAD in kernel space will forward request to the cloud

D.

RAD forwards this request to CMI which is the brain of inspection

Buy Now
Questions 29

What components make up the Context Management Infrastructure?

Options:

A.

CPMI and FW Loader

B.

CPX and FWM

C.

CPM and SOLR

D.

CMI Loader and Pattern Matcher

Buy Now
Questions 30

Check Point Access Control Daemons contains several daemons for Software Blades and features. Which Daemon is used for Application & Control URL Filtering?

Options:

A.

pdpd

B.

rad

C.

cprad

D.

pepd

Buy Now
Questions 31

You found out that $FWDIR/Iog/fw.log is constantly growing in size at a Security Gateway, what is the reason?

Options:

A.

TCP state logging is enabled

B.

Its not a problem the gateways is logging connections and also sessions

C.

fw.log can grow when GW does not have space in logging directory

D.

The GW is logging locally

Buy Now
Questions 32

What command is usually used for general firewall kernel debugging and what is the size of the buffer that is automatically enabled when using the command?

Options:

A.

fw ctl debug, buffer size is 1024 KB

B.

fw ctl zdebug, buffer size is 1 MB

C.

fw ctl kdebug, buffer size is 32000 KB

D.

fw ctl zdebug, buffer size is 32768 KB

Buy Now
Exam Code: 156-587
Exam Name: Check Point Certified Troubleshooting Expert - R81.20 (CCTE)
Last Update: May 16, 2025
Questions: 109

PDF + Testing Engine

$57.75  $164.99

Testing Engine

$43.75  $124.99
buy now 156-587 testing engine

PDF (Q&A)

$36.75  $104.99
buy now 156-587 pdf