Spring Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

156-586 Sample Questions Answers

Questions 4

URL Filtering is an essential part of Web Security in the Gateway. For the Security Gateway to perform a URL lookup when a client makes a URL request, where is the sync-request forwarded from if a sync-request is required?

Options:

A.

RAD User Space

B.

URLF Online Service

C.

URLF Kernel Client

D.

RAD Kernel Space

Buy Now
Questions 5

Where do you enable log indexing on the SMS?

Options:

A.

SMS object under "Other"

B.

SMS object under "Advanced"

C.

SMS object under "Logs"

D.

SMS object under "General Properties"

Buy Now
Questions 6

What is the correct syntax to set all debug flags for Unified Policy related issues?

Options:

A.

fw ctl kdebug -m UP all

B.

fw ctl debug -m fw all

C.

fw ctl debug -m up all

D.

fw ctl debug -m UP all

Buy Now
Questions 7

For Identity Awareness, what is the PDP process?

Options:

A.

Identity server

B.

Log Sifter

C.

Captive Portal Service

D.

UserAuth Database

Buy Now
Questions 8

What is NOT a benefit of the ‘fw ctl zdebug’ command?

Options:

A.

Cannot be used to debug additional modules

B.

Clean the buffer

C.

Collect debug messages from the kernel

D.

Automatically allocate a 1MB buffer

Buy Now
Questions 9

Which of the following inputs is suitable for debugging HTTPS inspection issues?

Options:

A.

fw debug tls on TDERROR_ALL_ALL=5

B.

fw ctl debug -m fw + conn drop cptls

C.

vpn debug cptls on

D.

fw diag debug tls enable

Buy Now
Questions 10

That is the proper command for allowing the system to create core files?

Options:

A.

$FWDIR/scripts/core-dump-enable.sh

B.

# set core-dump enable

# save config

C.

> set core-dump enable

> save config

D.

service core-dump start

Buy Now
Questions 11

After kernel debug with "fw ctl debug" you received a huge amount of information. It was saved in a very large file that is difficult to open and analyze with standard text editors. Suggest a solution to solve this issue.

Options:

A.

Divide debug information into smaller files. Use "fw ctl kdebug -f -o "filename" -m 25 - s "1024"

B.

Use "fw ctl zdebug" because of 1024KB buffer size

C.

Use Check Point InfoView utility to analyze debug output

D.

Reduce debug buffer to 1024KB and run debug for several times

Buy Now
Questions 12

Captive Portal, PDP and PEP run in what space?

Options:

A.

Kernel

B.

User

C.

CPM

D.

FWD

Buy Now
Questions 13

When a User process or program suddenly crashes, a core dump is often used to examine the problem. Which command is used to enable the core-dumping via GAIA clish?

Options:

A.

set core-dump enable

B.

set core-dump per process

C.

set user-dump enable

D.

set core-dump total

Buy Now
Questions 14

In some scenarios it is very helpful to use advanced Linux commands for troubleshooting purposes. Which command displays information about resource utilization for running processes and shows additional information for core utilization and memory?

Options:

A.

top

B.

vmstat

C.

cptop

D.

mpstat

Buy Now
Questions 15

What command is used to find out which port Multi-Portal has assigned to the Mobile Access Portal?

Options:

A.

mpclient getdata sslvpn

B.

netstat getdata sslvpn

C.

netstat -nap | grep mobile

D.

mpclient getdata mobi

Buy Now
Questions 16

What is correct about the Resource Advisor (RAD) service on the Security Gateways?

Options:

A.

RAD functions completely in user space. The Pattern Matter (PM) module of the CMI looks up for URLs in the cache and if not found, contact the RAD process in user space to do online categorization

B.

RAD is completely loaded as a kernel module that looks up URL in cache and if not found connects online for categorization. There is no user space involvement in this process

C.

RAD is not a separate module, it is an integrated function of the W kernel module and does all operations in the kernel space

D.

RAD has a kernel module that looks up the kernel cache, notifies client about hits and misses and forwards a-sync requests to RAD user space module which is responsible for online categorization

Buy Now
Questions 17

Which process is responsible for the generation of certificates?

Options:

A.

dbsync

B.

cpm

C.

fwm

D.

cpca

Buy Now
Questions 18

Where will the usermode core files located?

Options:

A.

/var/log/dump/usermode

B.

$CPDIR/var/log/dump/usermode

C.

$FWDIR/var/log/dump/usermode

D.

/var/suroot

Buy Now
Questions 19

If SmartLog is not active or failed to parse results from server, what commands can be run to re-enable the service?

Options:

A.

smartlogrestart and smartlogstart

B.

smartlogstart and smartlogstop

C.

smartloginit and smartlogstop

D.

smartlogstart and smartlogsetup

Buy Now
Questions 20

The Check Point Firewall Kernel is the core component of the Gaia operating system and an integral part of traffic inspection process. There are two procedures available for debugging the firewall kernel. Which procedure/command is used for detailed troubleshooting and needs more resources?

Options:

A.

fw debug/kdebug

B.

fw ctl zdebug

C.

fw debug/kdebug ctl

D.

fw ctl debug/kdebug

Buy Now
Questions 21

What are the three main component of Identity Awareness?

Options:

A.

User, Active Directory and Access Role

B.

Identity Awareness Blade on Security Gateway, User Database on Security Management Server and Active Directory

C.

Identity Source, Identity Server (PDP) and Identity Enforcement (PEP)

D.

Client, SMS and Secure Gateway

Buy Now
Questions 22

Check Point Access Control Daemons contains several daemons for Software Blades and features. Which Daemon is used for Application & Control URL Filtering?

Options:

A.

cprac

B.

rad

C.

pepd

D.

pdpd

Buy Now
Status:
Expired , and Replaced By
Exam Code: 156-586
Exam Name: Check Point Certified Troubleshooting Expert - R81 (CCTE)
Last Update: Mar 10, 2024
Questions: 75
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now 156-586