Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Checkpoint 156-587 Dumps

Page: 1 / 11
Total 109 questions

Check Point Certified Troubleshooting Expert - R81.20 (CCTE) Questions and Answers

Question 1

User defined URLS and HTTPS inspection User defined URLs on the Security Gateway are stored in which database file?

Options:

A.

https_urif.bin

B.

urlf db.bin

C.

urtf_https.bin

D.

https_db.bin

Question 2

You do not see logs in the SMS. When you login on the SMS shell and run cpwd_admin list you notice that the RFL process is with status T. What command can you run to try to resolve it?

Options:

A.

RFLstop and RFLstart

B.

evstart and evstop

C.

smartlog_server stop and smartlog_server restart

D.

rflsop and rflstart

Question 3

What is the correct syntax to set all debug flags for Unified Policy related issues?

Options:

A.

fw ctl kdebug-m UP all

B.

fw ctl debug-m UP all

C.

fw ctl debug -m up all

D.

fw ctl debug -m fw all

Question 4

If the cpsemd process of SmartEvent has crashed or is having trouble coming up, then it usually indicates that __________.

Options:

A.

The SmartEvent core on the Solr indexer has been deleted

B.

The loqqed in administrator does not have permissions to run SmartEvent

C.

Postgres database is down

D.

Cpd daemon is unable to connect to the log server

Question 5

You receive reports that Users cannot browse internet sites. You are using identity awareness with AD Query and Identity Collector in addition you have the Browser Based Authentication Enabled. What command can be used to debug the problem?

Options:

A.

on the gateway: ad debug on

B.

on the gateway: ad query debug on

C.

on the management: ad query debug extended

D.

on the gateway: pdp debug nac extended

Question 6

Check Point Access Control Daemons contains several daemons for Software Blades and features. Which Daemon is used for Application & Control URL Filtering?

Options:

A.

pdpd

B.

rad

C.

cprad

D.

pepd

Question 7

What is the name of the VPN kernel process?

Options:

A.

VPND

B.

CVPND

C.

FWK

D.

VPNK

Question 8

Which process is responsible for the generation of certificates?

Options:

A.

dbsync

B.

cpm

C.

fwm

D.

cpca

Question 9

The packet processing infrastructure consists of 4 components. Which component contains the CLOB, the object that contains information about the packet that is needed to make security decisions?

Options:

A.

Manager

B.

Classifiers

C.

Handlers

D.

Observers

Question 10

Packet processing infrastructure consists of the following components EXCEPT:

Options:

A.

Observers

B.

Manager

C.

Client

D.

Classifiers

Question 11

You receive complains that Guest Users cannot login and use the Guest Network which is configured with Access Role of Guest Users. You need to verity the Captive Portal configuration. Where can

you find the config file?

Options:

A.

on the gateway at $NACPORTAL_ HOME/conf/httpd_ nac.conf

B.

on the management at SCPNAC_ HOME/conf/httpd_ nac.conf

C.

on the management at SNACPORTAL_ HOME/conf/httpd_ nac.conf

D.

on the gateway at $CPNAC_ HOME/conf/httpd_ nac.conf

Question 12

An administrator receives reports about issues with log indexing and text searching regarding an existing Management Server. In trying to find a solution she wants to check if the process responsible for this feature is running correctly. What is true about the related process?

Options:

A.

cpd needs to be restarted manual to show in the list

B.

fwm manaqes this database after initialization of the 1CA

C.

solr is a child process of cpm

D.

fwssd crashes can affect therefore not show in the list

Question 13

How does Identity Collector connect to Windows Server?

Options:

A.

ADQuery is needed for connection

B.

LDAP connection

C.

It uses a PDP demon to connect

D.

via Windows API

Question 14

What command would you run to verify the communication between the Security Gateway and the Identity Collector?

Options:

A.

fw ctl debug -m IDAPI

B.

pdp connections idc

C.

fw ctl debug -m fw + nac

D.

adlog

Question 15

Check Point provides tools & commands to help you to identify issues about products and applications. Which Check Point command can help you to display status and statistics information for various Check Point products and applications?

Options:

A.

CPview

B.

cpstat

C.

fwstat

D.

CPstat

Question 16

You are seeing output from the previous kernel debug. What command should you use to avoid that?

Options:

A.

fw ctl clean buffer = 0

B.

fw ctl debug 0

C.

fw ctl zdebug disable

D.

fw ctl debug = 0

Question 17

What version of Check Point can Security Gateways begin dynamically distributing Logs between log servers?

Options:

A.

R81

B.

R77

C.

R30

D.

R75

Question 18

Which of these packet processing components stores Rule Base matching state-related information?

Options:

A.

Classifiers

B.

Manager

C.

Handlers

D.

Observers

Question 19

What is the proper command for allowing the system to create core files?

Options:

A.

service core-dump start

B.

SFWDIR/scripts/core-dump-enable.sh

C.

set core-dump enable

>save config

D.

# set core-dump enable

# save config

Question 20

What are the three main component of Identity Awareness?

Options:

A.

Client, SMS and Secure Gateway

B.

Identity Source Identity Server (POP) and Identity Enforcement (PEP)

C.

Identity Awareness Blade on Security Gateway, User Database on Security Management Server and Active Directory

D.

User, Active Directory and Access Role

Question 21

You need to run a kernel debug over a longer period of time as the problem occurs only once or twice a week Therefore you need to add a timestamp to the kernel debug and write the output to a file. What is the correct syntax for this?

Options:

A.

fw ctl debug -T -f > filename debug

B.

fw ctl kdebug -T -f -o filename debug

C.

fw ell kdebug -T > filename debug

D.

fw ctl kdebug -T -f > filename.debug

Question 22

Captive Portal, PDP and PEP run in what space?

Options:

A.

User

B.

CPM

C.

FWD

D.

Kernel

Question 23

You run cpwd_admin list on a Security Gateway and notice that the CPM process is not listed. Select the best answer.

Options:

A.

The output is different between Gateway and Management Server.

B.

CPM is not running and can’t be monitored by WatchDog.

C.

If you want to monitor CPM, you have to manually add it to WatchDog.

D.

CPM is not there because it has its own monitoring system. Only lower processes are monitored by WatchDog.

Question 24

You are using the identity Collector with identity Awareness in large environment. Users report that they cannot access resources on Internet You identify that the traffic is matching the cleanup rule

Instead of the proper rule with Access Roles using the IDC How can you check if IDC is working?

Options:

A.

pdp connections idc

B.

ad query I debug on

C.

pep debug idc on

D.

pdp debug set IDP all

Question 25

After kernel debug with “fw ctl debug you received a huge amount of information It was saved in a very large file that is difficult to open and analyze with standard text editors Suggest a solution to

solve this issue

Options:

A.

Reduce debug buffer to 1024KB and run debug for several times

B.

Use Check Point InfoView utility to analyze debug output

C.

Use “fw ctl zdebug because of 1024KB buffer size

D.

Divide debug information into smaller files. Use “ fw ctl kdebug -f -o “filename -m 25 - s ‘’1024’’

Question 26

Which kernel process is used by Content Awareness to collect the data from contexts?

Options:

A.

PDP

B.

cpemd

C.

dlpda

D.

CMI

Question 27

You were asked by security team to debug Mobile Access VPN. What processes will you debug?

Options:

A.

HTTPD and CPVND

B.

IKED

C.

VPND and IKED

D.

SNX daemon

Question 28

What file contains the RAD proxy settings?

Options:

A.

rad_control.C

B.

rad_scheme.C

C.

rad_services.C

D.

rad_settings.C

Question 29

Which of the following is contained in the System Domain of the Postgres database?

Options:

A.

Trusted GUI clients

B.

Configuration data of log servers

C.

Saved queries for applications

D.

User modified configurations such as network objects

Question 30

How can you start debug of the Unified Policy with all possible flags turned on?

Options:

A.

fw ctl debug -m fw + UP

B.

fw ctl debug -m UP all

C.

fw ctl debug -m UP *

D.

fw ctl debug -m UnifiedPolicy all

Question 31

When a user space process or program suddenly crashes, what type of file is created for analysis

Options:

A.

core dump

B.

kernel_memory_dump dbg

C.

core analyzer

D.

coredebug

Question 32

You need to run a kernel debug over a longer period of time as the problem occurs only once or twice a week. Therefore you need to add a timestamp to the kernel debug and write the output to a file

but you cant afford to fill up all the remaining disk space and you only have 10 GB free for saving the debugs What is the correct syntax for this?

Options:

A.

A fw ctl kdebug -T -f -m 10 -s 1000000 -o debugfilename

B.

fw ctl debug -T -f-m 10 -s 1000000 -o debugfilename

C.

fw ctl kdebug -T -f -m 10 -s 1000000 > debugfilename

D.

fw ctl kdebug -T -m 10 -s 1000000 -o debugfilename

Page: 1 / 11
Total 109 questions