Summer Sale- Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Checkpoint 156-587 Check Point Certified Troubleshooting Expert - R81.20 (CCTE) Exam Practice Test

Page: 1 / 11
Total 109 questions

Check Point Certified Troubleshooting Expert - R81.20 (CCTE) Questions and Answers

Question 1

John has renewed his NPTX License but he gets an error (contract for Anti-Bot expired). He wants to check the subscription status on the CLI of the gateway, what command can he use for this?

Options:

A.

fwm lie print

B.

fw monitor license status

C.

cpstat antimalware-f subscription status

D.

show license status

Question 2

What is the simplest and most efficient way to check all dropped packets in real time?

Options:

A.

tail -f $FWDIR/log/fw.log |grep drop in expert mode

B.

cat /dev/fw1/log in expert mode

C.

fw ctl zdebug + drop in expert mode

D.

Smartlog

Question 3

The Check Point Firewall Kernel is the core component of the Gaia operating system and an integral part of traffic inspection process. There are two procedures available for debugging the firewall kernel. Which procedure/command is used for detailed troubleshooting and needs more resources?

Options:

A.

fw ctl zdebug

B.

fw debug/kdebug

C.

fw ctl debug/kdebug

D.

fw debug/kdebug ctl

Question 4

Which of the following is a component of the Context Management Infrastructure used to collect signatures in user space from multiple sources such as Application Control and IPS. and compiles them together into unified Pattern Matchers?

Options:

A.

Context Loader

B.

PSL - Passive Signature Loader

C.

cpas

D.

CMI Loader

Question 5

When viewing data for CPMI objects in the Postgres database, what table column should be selected to query for the object instance?

Options:

A.

CpmiHostCkp

B.

fwset

C.

CPM Global M

D.

GuiDBedit

Question 6

What Check Point process controls logging?

Options:

A.

FWD

B.

CPVVD

C.

CPM

D.

CPD

Question 7

What is the best way to resolve an issue caused by a frozen process?

Options:

A.

Power off the machine

B.

Restart the process

C.

Reboot the machine

D.

Kill the process

Question 8

Which command is used to write a kernel debug to a file?

Options:

A.

fw ctl kdebug -T -I > debug.txt

B.

fw ctl debug -S -t > debug.txt

C.

fw ctl kdebug -T -f > debug.txt

D.

fw ctl debut -T -f > debug.txt

Question 9

What information does the doctor-log script supply?

Options:

A.

Logging errors. Exceptions, Repair options

B.

Current and daily average logging rates. Indexing status, Size

C.

Logging rates, Logging Directories, List of troubleshooting tips

D.

Repair options. Logging Rates, Logging Directories

Question 10

When URL category is not found in the kernel cache, what action will GW do?

Options:

A.

RAD In user space will forward request to the cloud

B.

GW will update kernel cache during next policy install

C.

RAD in kernel space will forward request to the cloud

D.

RAD forwards this request to CMI which is the brain of inspection

Question 11

Where will the usermode core files located?

Options:

A.

$FWDIRVar/log/dump/usermode

B.

/var/suroot

C.

/var/log/dump/usermode

D.

$CPDIR/var/log/dump/usermode

Question 12

For identity Awareness what is the PDP process?

Options:

A.

Identity server

B.

Captive Portal Service

C.

User Auth Database

D.

Log Sifter

Question 13

Where do you enable log indexing on the SMS?

Options:

A.

SMS object under "Other"

B.

SMS object under "Advanced"

C.

SMS object under "Logs"

D.

SMS object under "General Properties"

Question 14

You receive reports that Users cannot browse internet sites. You are using identity awareness with AD Query and Identity Collector in addition you have the Browser Based Authentication Enabled. What command can be used to debug the problem?

Options:

A.

on the gateway: ad debug on

B.

on the gateway: ad query debug on

C.

on the management: ad query debug extended

D.

on the gateway: pdp debug nac extended

Question 15

You receive complains that Guest Users cannot login and use the Guest Network which is configured with Access Role of Guest Users. You need to verity the Captive Portal configuration. Where can

you find the config file?

Options:

A.

on the gateway at $NACPORTAL_ HOME/conf/httpd_ nac.conf

B.

on the management at SCPNAC_ HOME/conf/httpd_ nac.conf

C.

on the management at SNACPORTAL_ HOME/conf/httpd_ nac.conf

D.

on the gateway at $CPNAC_ HOME/conf/httpd_ nac.conf

Question 16

Which of the following file is commonly associated with troubleshooting crashes on a system such as the Security Gateway?

Options:

A.

tcpdump

B.

core dump

C.

fw monitor

D.

CPMIL dump

Question 17

What tool would you run to diagnose logging and indexing?

Options:

A.

run cpm_doctor.sh

B.

cpstat mg -f log_server

C.

run diagnostic view

D.

run doctor-log.sh

Question 18

In the Security Management Architecture, what port and process does SmartConsole use to communicate with the Security Management Server?

Options:

A.

CPM and 18190

B.

FWM and 19009

C.

CPM and 19009

D.

CPM, 19009, and 18191

Question 19

What is NOT a benefit of the ‘fw ctl zdebug’ command?

Options:

A.

Automatically allocate a 1MB buffer

B.

Collect debug messages from the kernel

C.

Cannot be used to debug additional modules

D.

Clean the buffer

Question 20

You are using the identity Collector with identity Awareness in large environment. Users report that they cannot access resources on Internet You identify that the traffic is matching the cleanup rule

Instead of the proper rule with Access Roles using the IDC How can you check if IDC is working?

Options:

A.

pdp connections idc

B.

ad query I debug on

C.

pep debug idc on

D.

pdp debug set IDP all

Question 21

What is the benefit of fw ctl debug over fw ctl zdebug?

Options:

A.

There is no difference Both are used for debugging kernel

B.

You don't need timestamps

C.

It allows you to debug multiple modules at the same time

D.

You only need 1MB buffer

Question 22

Like a Site-to-Site VPN between two Security Gateways, a Remote Access VPN relies on the Internet Key Exchange (IKE) what types of keys are generated by IKE during negotiation?

Options:

A.

Produce a symmetric key on both sides

B.

Produce an asymmetric key on both sides

C.

Symmetric keys based on pre-shared secret

D.

Produce a pair of public and private keys

Question 23

When a user space process or program suddenly crashes, what type of file is created for analysis

Options:

A.

core dump

B.

kernel_memory_dump dbg

C.

core analyzer

D.

coredebug

Question 24

Captive Portal, PDP and PEP run in what space?

Options:

A.

User

B.

CPM

C.

FWD

D.

Kernel

Question 25

SmartEvent utilizes the Log Server, Correlation Unit and SmartEvent Server to aggregate logs and identify security events. The three main processes that govern these SmartEvent components are:

Options:

A.

cpcu, cplog, cpse

B.

eventiasv, eventiarp,eventiacu

C.

cpsemd, cpsead, and DBSync

D.

fwd, secu, sesrv

Question 26

What is NOT monitored as a PNOTE by ClusterXL?

Options:

A.

TED

B.

Policy

C.

RouteD

D.

VPND

Question 27

What file contains the RAD proxy settings?

Options:

A.

rad_control.C

B.

rad_scheme.C

C.

rad_services.C

D.

rad_settings.C

Question 28

You do not see logs in the SMS. When you login on the SMS shell and run cpwd_admin list you notice that the RFL process is with status T. What command can you run to try to resolve it?

Options:

A.

RFLstop and RFLstart

B.

evstart and evstop

C.

smartlog_server stop and smartlog_server restart

D.

rflsop and rflstart

Question 29

Which of the following would NOT be a flag when debugging a unified policy?

Options:

A.

tls

B.

rulebase

C.

clob

D.

connection

Question 30

Which of the following daemons is used for Threat Extraction?

Options:

A.

extractd

B.

tedex

C.

tex

D.

scrubd

Question 31

What is correct about the Resource Advisor (RAD) service on the Security Gateways?

Options:

A.

RAD is not a separate module, it is an integrated function of the ‘fw’ kernel module and does all operations in the kernel space

B.

RAD functions completely in user space The Pattern Matter (PM) module of the CMI looks up for URLs in the cache and if not found, contact the RAD process in user space to do online categorization

C.

RAD is completely loaded as a kernel module that looks up URL in cache and if not found connects online for categorization There is no user space involvement in this process

D.

RAD has a kernel module that looks up the kernel cache notifies client about hits and misses and forwards a-sync requests to RAD user space module which is responsible for online categorization

Question 32

For Identity Awareness, what is the PDP process?

Options:

A.

Identity server

B.

Log Sifter

C.

Captive Portal Service

D.

UserAuth Database

Page: 1 / 11
Total 109 questions