Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Checkpoint 156-587 Check Point Certified Troubleshooting Expert - R81.20 (CCTE) Exam Practice Test

Demo: 32 questions
Total 109 questions

Check Point Certified Troubleshooting Expert - R81.20 (CCTE) Questions and Answers

Question 1

Which kernel process is used by Content Awareness to collect the data from contexts?

Options:

A.

PDP

B.

cpemd

C.

dlpda

D.

CMI

Question 2

For Identity Awareness, what is the PDP process?

Options:

A.

Identity server

B.

Log Sifter

C.

Captive Portal Service

D.

UserAuth Database

Question 3

What is the proper command for allowing the system to create core files?

Options:

A.

service core-dump start

B.

SFWDIR/scripts/core-dump-enable.sh

C.

set core-dump enable

>save config

D.

# set core-dump enable

# save config

Question 4

What is NOT a benefit of the ‘fw ctl zdebug’ command?

Options:

A.

Automatically allocate a 1MB buffer

B.

Collect debug messages from the kernel

C.

Cannot be used to debug additional modules

D.

Clean the buffer

Question 5

SmartEvent utilizes the Log Server, Correlation Unit and SmartEvent Server to aggregate logs and identify security events. The three main processes that govern these SmartEvent components are:

Options:

A.

cpcu, cplog, cpse

B.

eventiasv, eventiarp,eventiacu

C.

cpsemd, cpsead, and DBSync

D.

fwd, secu, sesrv

Question 6

The Check Point Firewall Kernel is the core component of the Gaia operating system and an integral part of the traffic inspection process. There are two procedures available for debugging the firewall kernel. Which procedure/command is used for troubleshooting packet drops and other kernel activities while using minimal resources (1 MB buffer)?

Options:

A.

fw ctl zdebug

B.

fwk ell debug

C.

fw debug ctl

D.

fw ctl debug/kdebug

Question 7

You are using the identity Collector with identity Awareness in large environment. Users report that they cannot access resources on Internet You identify that the traffic is matching the cleanup rule

Instead of the proper rule with Access Roles using the IDC How can you check if IDC is working?

Options:

A.

pdp connections idc

B.

ad query I debug on

C.

pep debug idc on

D.

pdp debug set IDP all

Question 8

The Check Point Watch Daemon (CPWD) monitors critical Check Point processes, terminating them or restarting them as needed to maintain consistent, stable operating conditions. When checking the status/output of CPWD you are able to see some columns like APP, PID, STAT, START, etc. What is the column "STAT" used for?

Options:

A.

Shows the Watch Dog name of the monitored process

B.

Shows the status of the monitored process

C.

Shows how many times the Watch Dog started the monitored process

D.

Shows what monitoring method Watch Dog is using to track the process

Question 9

In Mobile Access VPN. clientless access is done using a web browser. The primary communication path for these browser based connections is a process that allows numerous processes to utilize port

443 and redirects traffic to a designated port of the respective process Which daemon handles this?

Options:

A.

Multi-portal Daemon (MPD)

B.

Mobile Access Daemon (MAD)

C.

HTTPS Inspection Daemon (HID)

D.

Connectra VPN Daemon (cvpnd)

Question 10

What file contains the RAD proxy settings?

Options:

A.

rad_control.C

B.

rad_scheme.C

C.

rad_services.C

D.

rad_settings.C

Question 11

What is the kernel process for Content Awareness that collects the data from the contexts received from the CMI and decides if the file is matched by a data type?

Options:

A.

cntawmod

B.

cntmgr

C.

dlpda

D.

dlpu

Question 12

Which command is used to write a kernel debug to a file?

Options:

A.

fw ctl kdebug -T -I > debug.txt

B.

fw ctl debug -S -t > debug.txt

C.

fw ctl kdebug -T -f > debug.txt

D.

fw ctl debut -T -f > debug.txt

Question 13

Which of the following would NOT be a flag when debugging a unified policy?

Options:

A.

tls

B.

rulebase

C.

clob

D.

connection

Question 14

Which of the following commands can be used to see the list of processes monitored by the Watch Dog process?

Options:

A.

cpstat fw -f watchdog

B.

fw ctl get str watchdog

C.

cpwd_admin list

D.

ps -ef | grep watchd

Question 15

When debugging is enabled on firewall kernel module using the fw ctl debug' command with required options, many debug messages are provided by the kernel that help the administrator to identify

Issues. Which of the following is true about these debug messages generated by the kernel module?

Options:

A.

Messages are written to /etc/dmesg file

B.

Messages are written to a buffer and collected using ‘fw ctl kdebug

C.

Messages are written to SFWDIR

D.

Messages are written to console and also /var/log/messages file

Question 16

When a User Mode process suddenly crashes, it may create a core dump file. Which of the following information is available in the core dump and may be used to identify the root cause of the crash?

i. Program Counter

ii. Stack Pointer

iii. Memory management information

iv. Other Processor and OS flags / information

Options:

A.

iii and iv only

B.

i and ii only

C.

i, ii, iii and iv

D.

Only lii

Question 17

URL Filtering is an essential part of Web Security in the Gateway. For the Security Gateway to perform a URL lookup when a client makes a URL request, where is the sync-request forwarded from if a sync-request is required?

Options:

A.

URLF Kernel Client

B.

RAD User Space

C.

RAD Kernel Space

D.

URLF Online Service

Question 18

What is the buffer size set by the fw ctl zdebug command?

Options:

A.

8GB

B.

1 MB

C.

1 GB

D.

8 MB

Question 19

What are the three main component of Identity Awareness?

Options:

A.

Client, SMS and Secure Gateway

B.

Identity Source Identity Server (POP) and Identity Enforcement (PEP)

C.

Identity Awareness Blade on Security Gateway, User Database on Security Management Server and Active Directory

D.

User, Active Directory and Access Role

Question 20

How does Identity Collector connect to Windows Server?

Options:

A.

ADQuery is needed for connection

B.

LDAP connection

C.

It uses a PDP demon to connect

D.

via Windows API

Question 21

What component is NOT part of Unified policy manager?

Options:

A.

Classifier

B.

CMI

C.

Handle

D.

Observer

Question 22

What is the Security Gateway directory where an administrator can find vpn debug log files generated during Site-to-Site VPN troubleshooting?

Options:

A.

SFWDIR/conf/

B.

SCPDIR/conf/

C.

SFWDIR/log/

D.

opt/CPsuiteR80/vpn/log/

Question 23

When a User process or program suddenly crashes, a core dump is often used to examine the problem Which command is used to enable the core-dumping via GAIA clish?

Options:

A.

set core-dump enable

B.

set core-dump total

C.

set user-dump enable

D.

set core-dump per_process

Question 24

VPNs allow traffic to pass through the Internet securely by encrypting the traffic as it enters the VPN tunnel and decrypting the traffic as it exits. Which process is responsible for Mobile VPN connections?

Options:

A.

cvpnd

B.

fwk

C.

vpnd

D.

vpnk

Question 25

What information does the doctor-log script supply?

Options:

A.

Logging errors. Exceptions, Repair options

B.

Current and daily average logging rates. Indexing status, Size

C.

Logging rates, Logging Directories, List of troubleshooting tips

D.

Repair options. Logging Rates, Logging Directories

Question 26

What process monitors terminates, and restarts critical Check Point processes as necessary?

Options:

A.

CPM

B.

FWD

C.

CPWD

D.

FWM

Question 27

You were asked by security team to debug Mobile Access VPN. What processes will you debug?

Options:

A.

HTTPD and CPVND

B.

IKED

C.

VPND and IKED

D.

SNX daemon

Question 28

The management configuration stored in the Postgres database is partitioned into several relational database domains. What is the purpose of the Global Domain?

Options:

A.

Global Domains is used by the IPS software blade to map the IDs to the corresponding countries according to the IpToCountry.csv file.

B.

This domain is used as the global database to back up the objects referencing the corresponding object attributes from the System Domain.

C.

This domain is used as the global database to track the changes made by multiple administrators on the same objects prior to publishing.

D.

This domain is used as the global database for MDSM and contains global objects and policies.

Question 29

PostgreSQL is a powerful, open source relational database management system. Check Point offers a command for viewing the database to interact with Postgres interactive shell. Which command do you need to enter the PostgreSQL interactive shell?

Options:

A.

mysql_client cpm postgres

B.

mysql -u root

C.

psql_client cpm postgres

D.

psql_client postgres cpm

Question 30

User defined URLS and HTTPS inspection User defined URLs on the Security Gateway are stored in which database file?

Options:

A.

https_urif.bin

B.

urlf db.bin

C.

urtf_https.bin

D.

https_db.bin

Question 31

You are seeing output from the previous kernel debug. What command should you use to avoid that?

Options:

A.

fw ctl clean buffer = 0

B.

fw ctl debug 0

C.

fw ctl zdebug disable

D.

fw ctl debug = 0

Question 32

What is the correct syntax to turn a VPN debug on and create new empty debug files'?

Options:

A.

vpndebug trunc on

B.

vpn debug truncon

C.

vpn debug trunkon

D.

vpn kdebug on

Demo: 32 questions
Total 109 questions