Weekend Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Checkpoint 156-586 Check Point Certified Troubleshooting Expert - R81 (CCTE) Exam Practice Test

Demo: 22 questions
Total 75 questions

Check Point Certified Troubleshooting Expert - R81 (CCTE) Questions and Answers

Question 1

You need to run a kernel debug over a longer period of time as the problem occurs only once or twice a week. Therefore, you need to add a timestamp to the kernel debug and write the output to a file but you can’t afford to fill up all the remaining disk space and you only have 10 GB free for saving the debugs. What is the correct syntax for this?

Options:

A.

fw ctl debug -T -f -m 10 -s 1000000 -o debugfilename

B.

fw ctl kdebug -T -f -m 10 -s 1000000 > debugfilename

C.

fw ctl kdebug -T -f -m 10 -s 1000000 -o debugfilename

D.

fw ctl kdebug-T -m 10 -s 1000000 -o debugfilename

Question 2

When a User Mode process suddenly crashes, it may create a core dump file. Which of the following information is available in the core dump and may be used to identify the root cause of the crash?

i. Program Counter

ii. Stack Pointer

iii. Memory management information

iv. Other Processor and OS flags / information

Options:

A.

iii and iv only

B.

i, ii, iii and iv

C.

i and ii only

D.

Only iii

Question 3

When a User process or program suddenly crashes, a core dump is often used to examine the problem. Which command is used to enable the core-dumping via GAIA clish?

Options:

A.

set core-dump enable

B.

set core-dump per process

C.

set user-dump enable

D.

set core-dump total

Question 4

You receive reports from multiple users that they cannot browse. Upon further discovery you identify that Identity Awareness cannot identify the users properly and apply the configured Access Roles. What commands you can use to troubleshoot all identity collectors and identity providers from the command line?

Options:

A.

on the gateway: pdp debug set AD all and IDC all

B.

on the management: pdp debug on IDC all

C.

on the management: pdp debug set all all

D.

Ion the gateway: pdp debug set IDC all IDP all

Question 5

Captive Portal, PDP and PEP run in what space?

Options:

A.

Kernel

B.

User

C.

CPM

D.

FWD

Question 6

You do not see logs in the SMS. When you login on the SMS shell and run cpwd_admin list you notice that the RFL process is with status T. What command can you run to try to resolve it?

Options:

A.

RFLstop and RFLstart

B.

evstart and evstop

C.

smartlog_server stop and smartlog_server restart

D.

rflsop and rflstart

Question 7

The Check Point Firewall Kernel is the core component of the Gaia operating system and an integral part of traffic inspection process. There are two procedures available for debugging the firewall kernel. Which procedure/command is used for detailed troubleshooting and needs more resources?

Options:

A.

fw debug/kdebug

B.

fw ctl zdebug

C.

fw debug/kdebug ctl

D.

fw ctl debug/kdebug

Question 8

The FileApp parser in the Content Awareness engine does not extract text from which of the following file types?

Options:

A.

Microsoft Office Excel files

B.

PDF’s

C.

Microsoft Office .docx files

D.

Microsoft Office Powerpoint files

Question 9

If the cpsemd process of SmartEvent has crashed or is having trouble coming up, then it usually indicates that __________.

Options:

A.

The SmartEvent core on the Solr indexer has been deleted

B.

The loqqed in administrator does not have permissions to run SmartEvent

C.

Postgres database is down

D.

Cpd daemonis unable to connect to the logserver

Question 10

Which of the following is a component of the Context Management Infrastructure used to collect signatures in user space from multiple sources, such as Application Control and IPS, and compiles them together into unified Pattern Matchers?

Options:

A.

PSL - Passive Signature Loader

B.

cpas

C.

Context Loader

D.

CMI Loader

Question 11

How can you start debug of the Unified Policy with all possible flags turned on?

Options:

A.

fw ctl debug -m UP all

B.

fw ctl debug -m UP

C.

fw ctl debug -m fw + UP

D.

fw ctl debuq -m UnifiedPolicv all

Question 12

When viewing data for CPMI objects in the Postgres database, what table column should be selected to query for the object instance?

Options:

A.

CpmiHostCkp

B.

fwset

C.

CPM Global M

D.

GuiDBedit

Question 13

You are seeing output from the previous kernel debug. What command should you use to avoid that?

Options:

A.

fw ctl debug = 0

B.

fw ctl clean buffer = 0

C.

fw ctl zdebug disable

D.

fw ctl debug 0

Question 14

VPN's allow traffic to pass through the Internet securely by encrypting the traffic as it enters the VPN tunnel and then decrypting the traffic as it exists. Which process is responsible for Mobile VPN connections?

Options:

A.

cvpnd

B.

vpnk

C.

fwk

D.

vpnd

Question 15

In Mobile Access VPN, clientless access is done using a web browser. The primary communication path for these browser based connections is a process that allows numerous processes to utilize port 443 and redirects traffic to a designated port of the respective process. Which daemon handles this?

Options:

A.

Mobile Access Daemon (MAD)

B.

Connectra VPN Daemon (cvpnd)

C.

HTTPS Inspection Daemon (HID)

D.

Multi-portal Daemon

Question 16

What is the port for the Log Collection on Security Management Server?

Options:

A.

253

B.

443

C.

18191

D.

257

Question 17

The two procedures available for debugging in the firewall kernel are

i. fw ctl zdebug

ii. fw ctl debug/kdebug

Choose the correct statement explaining the differences in the two

Options:

A.

(i) is used to debug only issues related to dropping of traffic, however (ii) can be used for any firewall issue including NATing, clustering etc.

B.

(i) is used to debug the access control policy only, however (ii) can be used to debug a unified policy

C.

(i) is used on a Security Gateway, whereas (ii) is used on a Security Management Server

D.

(i) is used for general debugging, has a small buffer and is a quick way to set kernel debug flags to getan output via command line whereas (ii) is useful when there is a need for detailed debugging and requires additional steps to set the buffer and get an output via command line

Question 18

Which of the following commands can be used to see the list of processes monitored by the Watch Dog process?

Options:

A.

ps -ef | grep watchd

B.

cpstat fw -f watchdog

C.

cpwd_admin list

D.

fw ctl get str watchdog

Question 19

The Check Point Watch Daemon (CPWD) monitors critical Check Point processes, terminating them or restarting them as needed to maintain consistent, stable operating conditions. When checking the status/output of CPWD you are able to see some columns like APP, PID, STAT, START, etc. What is the column "STAT" used for?

Options:

A.

Shows the Watch Dog name of the monitored process

B.

Shows the status of the monitored process

C.

Shows how many times the Watch Dog started the monitored process

D.

Shows what monitoring method Watch Dog is using totrack the process

Question 20

What is the name of the VPN kernel process?

Options:

A.

FWK

B.

VPND

C.

CVPND

D.

VPNK

Question 21

Troubleshooting issues with Mobile Access requires the following:

Options:

A.

Standard VPN debugs and packet captures on Security Gateway, debugs of ‘cvpnd’ process on Security Management

B.

Debug logs of FWD captured with the command - ‘fw debug fwd on TDERROR_MOBILE_ACCESS=5’

C.

‘ma_vpnd’ process on Security Gateway

D.

Standard VPN debugs, packet captures, and debugs of ‘cvpnd’ process on Security Gateway

Question 22

Your users have some issues connecting with Mobile Access VPN to your gateway. How can you debug the tunnel establishment?

Options:

A.

in the file $CVPNDIR/conf/httpd.conf change the line Loglevel .. To LogLevel debug and run cvpnrestart

B.

in the file $VPNDIR/conf/httpd.conf change the line Loglevel .. To LogLevel debug and run vpn restart

C.

run vpn debug truncon

D.

run fw ctl zdebug -m sslvpn all

Demo: 22 questions
Total 75 questions