Check Point Certified Troubleshooting Expert - R81.20 (CCTE) Questions and Answers
User defined URLS and HTTPS inspection User defined URLs on the Security Gateway are stored in which database file?
You do not see logs in the SMS. When you login on the SMS shell and run cpwd_admin list you notice that the RFL process is with status T. What command can you run to try to resolve it?
What is the correct syntax to set all debug flags for Unified Policy related issues?
If the cpsemd process of SmartEvent has crashed or is having trouble coming up, then it usually indicates that __________.
You receive reports that Users cannot browse internet sites. You are using identity awareness with AD Query and Identity Collector in addition you have the Browser Based Authentication Enabled. What command can be used to debug the problem?
Check Point Access Control Daemons contains several daemons for Software Blades and features. Which Daemon is used for Application & Control URL Filtering?
What is the name of the VPN kernel process?
Which process is responsible for the generation of certificates?
The packet processing infrastructure consists of 4 components. Which component contains the CLOB, the object that contains information about the packet that is needed to make security decisions?
Packet processing infrastructure consists of the following components EXCEPT:
You receive complains that Guest Users cannot login and use the Guest Network which is configured with Access Role of Guest Users. You need to verity the Captive Portal configuration. Where can
you find the config file?
An administrator receives reports about issues with log indexing and text searching regarding an existing Management Server. In trying to find a solution she wants to check if the process responsible for this feature is running correctly. What is true about the related process?
How does Identity Collector connect to Windows Server?
What command would you run to verify the communication between the Security Gateway and the Identity Collector?
Check Point provides tools & commands to help you to identify issues about products and applications. Which Check Point command can help you to display status and statistics information for various Check Point products and applications?
You are seeing output from the previous kernel debug. What command should you use to avoid that?
What version of Check Point can Security Gateways begin dynamically distributing Logs between log servers?
Which of these packet processing components stores Rule Base matching state-related information?
What is the proper command for allowing the system to create core files?
What are the three main component of Identity Awareness?
You need to run a kernel debug over a longer period of time as the problem occurs only once or twice a week Therefore you need to add a timestamp to the kernel debug and write the output to a file. What is the correct syntax for this?
Captive Portal, PDP and PEP run in what space?
You run cpwd_admin list on a Security Gateway and notice that the CPM process is not listed. Select the best answer.
You are using the identity Collector with identity Awareness in large environment. Users report that they cannot access resources on Internet You identify that the traffic is matching the cleanup rule
Instead of the proper rule with Access Roles using the IDC How can you check if IDC is working?
After kernel debug with “fw ctl debug you received a huge amount of information It was saved in a very large file that is difficult to open and analyze with standard text editors Suggest a solution to
solve this issue
Which kernel process is used by Content Awareness to collect the data from contexts?
You were asked by security team to debug Mobile Access VPN. What processes will you debug?
What file contains the RAD proxy settings?
Which of the following is contained in the System Domain of the Postgres database?
How can you start debug of the Unified Policy with all possible flags turned on?
When a user space process or program suddenly crashes, what type of file is created for analysis
You need to run a kernel debug over a longer period of time as the problem occurs only once or twice a week. Therefore you need to add a timestamp to the kernel debug and write the output to a file
but you cant afford to fill up all the remaining disk space and you only have 10 GB free for saving the debugs What is the correct syntax for this?