Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Checkpoint > CCTE > 156-587

156-587 Check Point Certified Troubleshooting Expert - R81.20 (CCTE) Question and Answers

Question # 4

After kernel debug with “fw ctl debug you received a huge amount of information It was saved in a very large file that is difficult to open and analyze with standard text editors Suggest a solution to

solve this issue

A.

Reduce debug buffer to 1024KB and run debug for several times

B.

Use Check Point InfoView utility to analyze debug output

C.

Use “fw ctl zdebug because of 1024KB buffer size

D.

Divide debug information into smaller files. Use “ fw ctl kdebug -f -o “filename -m 25 - s ‘’1024’’

Full Access
Question # 5

Which process is responsible for the generation of certificates?

A.

dbsync

B.

cpm

C.

fwm

D.

cpca

Full Access
Question # 6

What is NOT a benefit of the ‘fw ctl zdebug’ command?

A.

Automatically allocate a 1MB buffer

B.

Collect debug messages from the kernel

C.

Cannot be used to debug additional modules

D.

Clean the buffer

Full Access
Question # 7

In Mobile Access VPN. clientless access is done using a web browser. The primary communication path for these browser based connections is a process that allows numerous processes to utilize port

443 and redirects traffic to a designated port of the respective process Which daemon handles this?

A.

Multi-portal Daemon (MPD)

B.

Mobile Access Daemon (MAD)

C.

HTTPS Inspection Daemon (HID)

D.

Connectra VPN Daemon (cvpnd)

Full Access
Question # 8

Which of the following commands can be used to see the list of processes monitored by the Watch Dog process?

A.

cpstat fw -f watchdog

B.

fw ctl get str watchdog

C.

cpwd_admin list

D.

ps -ef | grep watchd

Full Access
Question # 9

What version of Check Point can Security Gateways begin dynamically distributing Logs between log servers?

A.

R81

B.

R77

C.

R30

D.

R75

Full Access
Question # 10

What is the correct syntax to set all debug flags for Unified Policy related issues?

A.

fw ctl kdebug-m UP all

B.

fw ctl debug-m UP all

C.

fw ctl debug -m up all

D.

fw ctl debug -m fw all

Full Access
Question # 11

When a user space process or program suddenly crashes, what type of file is created for analysis

A.

core dump

B.

kernel_memory_dump dbg

C.

core analyzer

D.

coredebug

Full Access
Question # 12

What is the function of the Core Dump Manager utility?

A.

To determine which process is slowing down the system

B.

To send crash information to an external analyzer

C.

To limit the number of core dump files per process as well as the total amount of disk space used by core files

D.

To generate a new core dump for analysis

Full Access
Question # 13

You receive reports that Users cannot browse internet sites. You are using identity awareness with AD Query and Identity Collector in addition you have the Browser Based Authentication Enabled. What command can be used to debug the problem?

A.

on the gateway: ad debug on

B.

on the gateway: ad query debug on

C.

on the management: ad query debug extended

D.

on the gateway: pdp debug nac extended

Full Access
Question # 14

John has renewed his NPTX License but he gets an error (contract for Anti-Bot expired). He wants to check the subscription status on the CLI of the gateway, what command can he use for this?

A.

fwm lie print

B.

fw monitor license status

C.

cpstat antimalware-f subscription status

D.

show license status

Full Access
Question # 15

When debugging is enabled on firewall kernel module using the fw ctl debug' command with required options, many debug messages are provided by the kernel that help the administrator to identify

Issues. Which of the following is true about these debug messages generated by the kernel module?

A.

Messages are written to /etc/dmesg file

B.

Messages are written to a buffer and collected using ‘fw ctl kdebug

C.

Messages are written to SFWDIR

D.

Messages are written to console and also /var/log/messages file

Full Access
Question # 16

Where will the usermode core files located?

A.

$FWDIRVar/log/dump/usermode

B.

/var/suroot

C.

/var/log/dump/usermode

D.

$CPDIR/var/log/dump/usermode

Full Access
Question # 17

You want to fully investigate the VPN establishment, what will you do?

A.

vpn debug and use IKEview

B.

debug FWD because VPND Is child process

C.

use vpn tu command and use option 8 to start debug

D.

use kernel debug with fw ctl debug -m VPN all

Full Access
Question # 18

In Check Point's Packet Processing Infrastructure what is the role of Observers?

A.

Observers attach object IDs to traffic

B.

They store Rule Base matching state related information

C.

Observers monitor the state of Check Point gateways and report it to the security manager

D.

Observers decide whether or not to publish a CLOB to the Security Policy

Full Access
Question # 19

You need to monitor traffic pre-inbound and before the VPN module in a Security Gateway. How would you achieve this using fw monitor?

A.

fw monitor -p all

B.

fw monitor -pi -vpn

C.

fw monitor -pi +vpn

D.

fw monitor -pi +vpn

Full Access
Question # 20

You found out that $FWDIR/Iog/fw.log is constantly growing in size at a Security Gateway, what is the reason?

A.

TCP state logging is enabled

B.

Its not a problem the gateways is logging connections and also sessions

C.

fw.log can grow when GW does not have space in logging directory

D.

The GW is logging locally

Full Access
Question # 21

What is the name of the VPN kernel process?

A.

VPND

B.

CVPND

C.

FWK

D.

VPNK

Full Access
Question # 22

What command is usually used for general firewall kernel debugging and what is the size of the buffer that is automatically enabled when using the command?

A.

fw ctl debug, buffer size is 1024 KB

B.

fw ctl zdebug, buffer size is 1 MB

C.

fw ctl kdebug, buffer size is 32000 KB

D.

fw ctl zdebug, buffer size is 32768 KB

Full Access
Question # 23

Which command is used to write a kernel debug to a file?

A.

fw ctl kdebug -T -I > debug.txt

B.

fw ctl debug -S -t > debug.txt

C.

fw ctl kdebug -T -f > debug.txt

D.

fw ctl debut -T -f > debug.txt

Full Access
Question # 24

What is NOT monitored as a PNOTE by ClusterXL?

A.

TED

B.

Policy

C.

RouteD

D.

VPND

Full Access
Question # 25

Which two files contain the Application Database on the Security Gateway?

A.

api_db.C and api_custom_db.C

B.

apcl_db.C and apd_custom_db.C

C.

application_db.C and application_custom_db.C

D.

appi_db.C and appi_custom_db.C

Full Access
Question # 26

VPN issues may result from misconfiguration communication failure, or incompatible default configurations between peers. Which basic command syntax needs to be used for troubleshooting Site-toSite VPN Issues?

A.

vpn truncon debug

B.

cp debug truncon

C.

fw debug truncon

D.

vpn debug truncon

Full Access
Question # 27

The two procedures available for debugging in the firewall kernel are

i. fw ctl zdebug

ii. fw ctl debug/kdebug

Choose the correct statement explaining the differences in the two

A.

(i) is used to debug only issues related to dropping of traffic, however (ii) can be used for any firewall issue including NATing, clustering etc.

B.

(i) is used to debug the access control policy only, however (ii) can be used to debug a unified policy

C.

(i) is used on a Security Gateway, whereas (ii) is used on a Security Management Server

D.

(i) is used for general debugging, has a small buffer and is a quick way to set kernel debug flags to getan output via command line whereas (ii) is useful when there is a need for detailed debugging and requires additional steps to set the buffer and get an output via command line

Full Access
Question # 28

The Check Point Watch Daemon (CPWD) monitors critical Check Point processes, terminating them or restarting them as needed to maintain consistent, stable operating conditions. When checking the status/output of CPWD you are able to see some columns like APP, PID, STAT, START, etc. What is the column "STAT" used for?

A.

Shows the Watch Dog name of the monitored process

B.

Shows the status of the monitored process

C.

Shows how many times the Watch Dog started the monitored process

D.

Shows what monitoring method Watch Dog is using to track the process

Full Access
Question # 29

Which of the following is contained in the System Domain of the Postgres database?

A.

Trusted GUI clients

B.

Configuration data of log servers

C.

Saved queries for applications

D.

User modified configurations such as network objects

Full Access
Question # 30

How does Identity Collector connect to Windows Server?

A.

ADQuery is needed for connection

B.

LDAP connection

C.

It uses a PDP demon to connect

D.

via Windows API

Full Access
Question # 31

You were asked by security team to debug Mobile Access VPN. What processes will you debug?

A.

HTTPD and CPVND

B.

IKED

C.

VPND and IKED

D.

SNX daemon

Full Access
Question # 32

VPNs allow traffic to pass through the Internet securely by encrypting the traffic as it enters the VPN tunnel and decrypting the traffic as it exits. Which process is responsible for Mobile VPN connections?

A.

cvpnd

B.

fwk

C.

vpnd

D.

vpnk

Full Access