Winter Special Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

156-587 Check Point Certified Troubleshooting Expert - R81.20 (CCTE) Questions and Answers

Questions 4

Which of the following commands can be used to see the list of processes monitored by the Watch Dog process?

Options:

A.

cpstat fw -f watchdog

B.

fw ctl get str watchdog

C.

cpwd_admin list

D.

ps -ef | grep watchd

Buy Now
Questions 5

You were asked by security team to debug Mobile Access VPN. What processes will you debug?

Options:

A.

HTTPD and CPVND

B.

IKED

C.

VPND and IKED

D.

SNX daemon

Buy Now
Questions 6

What is NOT a benefit of the ‘fw ctl zdebug’ command?

Options:

A.

Automatically allocate a 1MB buffer

B.

Collect debug messages from the kernel

C.

Cannot be used to debug additional modules

D.

Clean the buffer

Buy Now
Questions 7

For identity Awareness what is the PDP process?

Options:

A.

Identity server

B.

Captive Portal Service

C.

User Auth Database

D.

Log Sifter

Buy Now
Questions 8

You modified kernel parameters and after rebooting the gateway, a lot of production traffic gets dropped and the gateway acts strangely What should you do"?

Options:

A.

Run command fw ctl set int fw1_kernel_all_disable=1

B.

Restore fwkem.conf from backup and reboot the gateway

C.

run fw unloadlocal to remove parameters from kernel

D.

Remove all kernel parameters from fwkem.conf and reboot

Buy Now
Questions 9

When viewing data for CPMI objects in the Postgres database, what table column should be selected to query for the object instance?

Options:

A.

CpmiHostCkp

B.

fwset

C.

CPM Global M

D.

GuiDBedit

Buy Now
Questions 10

You need to run a kernel debug over a longer period of time as the problem occurs only once or twice a week. Therefore you need to add a timestamp to the kernel debug and write the output to a file

but you cant afford to fill up all the remaining disk space and you only have 10 GB free for saving the debugs What is the correct syntax for this?

Options:

A.

A fw ctl kdebug -T -f -m 10 -s 1000000 -o debugfilename

B.

fw ctl debug -T -f-m 10 -s 1000000 -o debugfilename

C.

fw ctl kdebug -T -f -m 10 -s 1000000 > debugfilename

D.

fw ctl kdebug -T -m 10 -s 1000000 -o debugfilename

Buy Now
Questions 11

URL Filtering is an essential part of Web Security in the Gateway. For the Security Gateway to perform a URL lookup when a client makes a URL request, where is the sync-request forwarded from if a sync-request is required?

Options:

A.

RAD User Space

B.

URLF Online Service

C.

URLF Kernel Client

D.

RAD Kernel Space

Buy Now
Questions 12

During firewall kernel debug with fw ctl zdebug you received less information that expected. You noticed that a lot of messages were lost since the time the debug was started. What should you do to

resolve this issue?

Options:

A.

Increase debug buffer Use fw ctl debug -buf 32768

B.

Redirect debug output to file; Use fw ctl debug -o /debug.elg

C.

Redirect debug output to file; Use fw ctl zdebug -o /debug.elg

D.

Increase debug buffer; Use fw ctl zdebug -buf 32768

Buy Now
Questions 13

In Check Point's Packet Processing Infrastructure what is the role of Observers?

Options:

A.

Observers attach object IDs to traffic

B.

They store Rule Base matching state related information

C.

Observers monitor the state of Check Point gateways and report it to the security manager

D.

Observers decide whether or not to publish a CLOB to the Security Policy

Buy Now
Questions 14

You receive reports that Users cannot browse internet sites. You are using identity awareness with AD Query and Identity Collector in addition you have the Browser Based Authentication Enabled. What command can be used to debug the problem?

Options:

A.

on the gateway: ad debug on

B.

on the gateway: ad query debug on

C.

on the management: ad query debug extended

D.

on the gateway: pdp debug nac extended

Buy Now
Questions 15

What is the correct syntax to turn a VPN debug on and create new empty debug files'?

Options:

A.

vpndebug trunc on

B.

vpn debug truncon

C.

vpn debug trunkon

D.

vpn kdebug on

Buy Now
Questions 16

What Check Point process controls logging?

Options:

A.

FWD

B.

CPVVD

C.

CPM

D.

CPD

Buy Now
Questions 17

Which of the following file is commonly associated with troubleshooting crashes on a system such as the Security Gateway?

Options:

A.

tcpdump

B.

core dump

C.

fw monitor

D.

CPMIL dump

Buy Now
Questions 18

Check Point Access Control Daemons contains several daemons for Software Blades and features. Which Daemon is used for Application & Control URL Filtering?

Options:

A.

pdpd

B.

rad

C.

cprad

D.

pepd

Buy Now
Questions 19

What is the simplest and most efficient way to check all dropped packets in real time?

Options:

A.

tail -f $FWDIR/log/fw.log |grep drop in expert mode

B.

cat /dev/fw1/log in expert mode

C.

fw ctl zdebug + drop in expert mode

D.

Smartlog

Buy Now
Questions 20

The Unified Access Control policy eliminates the need to maintain policies for different access control features However, you need to start a general debug of the Unified Policy with all flags turned on Which of the following is the correct syntax?

Options:

A.

fw ctl debug -m UP all

B.

fw ctl debug -m UP + all flags

C.

fw ctl kdebug -m UP all

D.

fwm ctl debug -m UP all

Buy Now
Questions 21

You are using the identity Collector with identity Awareness in large environment. Users report that they cannot access resources on Internet You identify that the traffic is matching the cleanup rule

Instead of the proper rule with Access Roles using the IDC How can you check if IDC is working?

Options:

A.

pdp connections idc

B.

ad query I debug on

C.

pep debug idc on

D.

pdp debug set IDP all

Buy Now
Questions 22

Which of the following daemons is used for Threat Extraction?

Options:

A.

extractd

B.

tedex

C.

tex

D.

scrubd

Buy Now
Questions 23

What is the benefit of fw ctl debug over fw ctl zdebug?

Options:

A.

There is no difference Both are used for debugging kernel

B.

You don't need timestamps

C.

It allows you to debug multiple modules at the same time

D.

You only need 1MB buffer

Buy Now
Questions 24

Which of these packet processing components stores Rule Base matching state-related information?

Options:

A.

Observers

B.

Classifiers

C.

Manager

D.

Handlers

Buy Now
Questions 25

When dealing with monolithic operating systems such as Gaia where are system calls initiated from to achieve a required system level function?

Options:

A.

Kernel Mode

B.

Slow Path

C.

Medium Path

D.

User Mode

Buy Now
Questions 26

What is correct about the Resource Advisor (RAD) service on the Security Gateways?

Options:

A.

RAD is not a separate module, it is an integrated function of the ‘fw’ kernel module and does all operations in the kernel space

B.

RAD functions completely in user space The Pattern Matter (PM) module of the CMI looks up for URLs in the cache and if not found, contact the RAD process in user space to do online categorization

C.

RAD is completely loaded as a kernel module that looks up URL in cache and if not found connects online for categorization There is no user space involvement in this process

D.

RAD has a kernel module that looks up the kernel cache notifies client about hits and misses and forwards a-sync requests to RAD user space module which is responsible for online categorization

Buy Now
Questions 27

How can you start debug of the Unified Policy with all possible flags turned on?

Options:

A.

fw ctl debug -m fw + UP

B.

fw ctl debug -m UP all

C.

fw ctl debug -m UP *

D.

fw ctl debug -m UnifiedPolicy all

Buy Now
Questions 28

When a User Mode process suddenly crashes, it may create a core dump file. Which of the following information is available in the core dump and may be used to identify the root cause of the crash?

i. Program Counter

ii. Stack Pointer

iii. Memory management information

iv. Other Processor and OS flags / information

Options:

A.

iii and iv only

B.

i and ii only

C.

i, ii, iii and iv

D.

Only lii

Buy Now
Questions 29

For Identity Awareness, what is the PDP process?

Options:

A.

Identity server

B.

Log Sifter

C.

Captive Portal Service

D.

UserAuth Database

Buy Now
Questions 30

What is the best way to resolve an issue caused by a frozen process?

Options:

A.

Power off the machine

B.

Restart the process

C.

Reboot the machine

D.

Kill the process

Buy Now
Exam Code: 156-587
Exam Name: Check Point Certified Troubleshooting Expert - R81.20 (CCTE)
Last Update: Jan 18, 2025
Questions: 101

PDF + Testing Engine

$66  $164.99

Testing Engine

$50  $124.99
buy now 156-587 testing engine

PDF (Q&A)

$42  $104.99
buy now 156-587 pdf