Vcehome > CheckPoint > CCTE > 156-585 > 156-585 Online Practice Questions and Answers

156-585 Online Practice Questions and Answers

Questions 4

What is the benefit of running "vpn debug trunc over "vpn debug on"?

A. "vpn debug trunc" purges ike.elg and vpnd elg and creates limestarnp while starting ike debug and vpn debug

B. "vpn debug trunc* truncates the capture hence the output contains minimal capture

C. "vpn debug trunc* provides verbose capture

D. No advantage one over the other

Browse 114 Q&As
Questions 5

Which situation triggers an IPS bypass under load on a 24-core Check Point appliance?

A. any of the CPU cores is above the threshold for more than 10 seconds

B. all CPU core most be above the threshold for more than 10 seconds

C. a single CPU core must be above the threshold for more than 10 seconds, but is must be the same core during this time

D. the average cpu utilization over all cores must be above the threshold for 1 second

Browse 114 Q&As
Questions 6

You need to run a kernel debug over a longer period of time as the problem occurs only once or twice a week. Therefore you need to add a timestamp to the kernel debug and write the output to a file

What is the correct syntax for this?

A. fw ctl kdebug -T -f > filename.debug

B. fw ctl kdebug -T > filename.debug

C. fw ctl debug -T -f > filename.debug

D. fw ctl kdebug -T -f -o filename.debug

Browse 114 Q&As
Questions 7

James is using the same filter expression in fw monitor for CITRIX very often and instead of typing this all the time he wants to add it as a macro to the fw monitor definition file.

What's the name and location of this file?

A. $FWDIR/lib/fwmonltor.def

B. $FWDIR/conf/fwmonltor.def

C. $FWDIR/lib/tcpip.def

D. $FWDIR/lib/fw.monitor

Browse 114 Q&As
Questions 8

Which of the following is contained in the System Domain of the Postgres database?

A. Saved queries for applications

B. Configuration data of log servers

C. Trusted GUI clients

D. User modified configurations such as network objects

Browse 114 Q&As
Questions 9

Check Point Access Control Daemons contains several daemons for Software Blades and features. Which Daemon is used for Application and Control Filtering?

A. rad

B. cprad

C. pepd

D. pdpd

Browse 114 Q&As
Questions 10

The Check Pom! Firewall Kernel is the core component of the Gaia operating system and an integral part of the traffic inspection process There are two procedures available for debugging the firewall kernel

Which procedure/command is used for troubleshooting packet drops and other kernel activites while using minimal resources (1 MB buffer)?

A. fw ctl zdebug

B. fw ctl debug/kdebug

C. fwk ctl debug

D. fw debug ctl

Browse 114 Q&As
Questions 11

Which command(s) will turn off all vpn debug collection?

A. vpn debug off

B. vpn debug -a off

C. vpn debug off and vpn debug ikeoff

D. fw ctl debug 0

Browse 114 Q&As
Questions 12

What does CMI stand for in relation to the Access Control Policy?

A. Content Matching Infrastructure

B. Content Management Interface

C. Context Management Infrastructure

D. Context Manipulation Interface

Browse 114 Q&As
Questions 13

For TCP connections, when a packet arrives at the Firewall Kemel out of sequence or fragmented, which layer of IPS corrects this lo allow for proper inspection?

A. Passive Streaming Library

B. Protections

C. Protocol Parsers

D. Context Management

Browse 114 Q&As
Exam Code: 156-585
Exam Name: Check Point Certified Troubleshooting Expert
Last Update: May 10, 2024
Questions: 114 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99