Winter Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Checkpoint 156-587 Check Point Certified Troubleshooting Expert - R81.20 (CCTE) Exam Practice Test

Page: 1 / 10
Total 101 questions

Check Point Certified Troubleshooting Expert - R81.20 (CCTE) Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$43.75  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$38.5  $109.99
Question 1

Like a Site-to-Site VPN between two Security Gateways, a Remote Access VPN relies on the Internet Key Exchange (IKE) what types of keys are generated by IKE during negotiation?

Options:

A.

Produce a symmetric key on both sides

B.

Produce an asymmetric key on both sides

C.

Symmetric keys based on pre-shared secret

D.

Produce a pair of public and private keys

Question 2

You modified kernel parameters and after rebooting the gateway, a lot of production traffic gets dropped and the gateway acts strangely What should you do"?

Options:

A.

Run command fw ctl set int fw1_kernel_all_disable=1

B.

Restore fwkem.conf from backup and reboot the gateway

C.

run fw unloadlocal to remove parameters from kernel

D.

Remove all kernel parameters from fwkem.conf and reboot

Question 3

What is the buffer size set by the fw ctl zdebug command?

Options:

A.

8GB

B.

1 MB

C.

1 GB

D.

8 MB

Question 4

You receive reports from multiple users that they cannot browse Upon further discovery you identify that Identity Awareness cannot identify the users properly and apply the configuredAccess Roles

What commands you can use to troubleshoot all identity collectors and identity providers from the command line?

Options:

A.

on the gateway:pdp debug set IDC all IDP all

B.

on the gateway:pdp debug set AD all and IDC all

C.

on the management:pdp debug on IDC all

D.

on the management: pdp debug set all

Question 5

An administrator receives reports about issues with log indexing and text searching regarding an existing Management Server. In trying to find a solution she wants to check if the process responsible for this feature is running correctly. What is true about the related process?

Options:

A.

cpd needs to be restarted manual to show in the list

B.

fwm manaqes this database after initialization of the 1CA

C.

solr is a child process of cpm

D.

fwssd crashes can affect therefore not show in the list

Question 6

What is the shorthand reference for a classification object?

Options:

A.

classobj

B.

CLOB

C.

COBJ

D.

class.obj

Question 7

Which of the following daemons is used for Threat Extraction?

Options:

A.

extractd

B.

tedex

C.

tex

D.

scrubd

Question 8

Check Point Access Control Daemons contains several daemons for Software Blades and features.Which Daemon is used forApplication & Control URL Filtering?

Options:

A.

pdpd

B.

rad

C.

cprad

D.

pepd

Question 9

What command would you run to verify the communication between the Security Gateway and the Identity Collector?

Options:

A.

fw ctl debug -m IDAPI

B.

pdp connections idc

C.

fw ctl debug -m fw + nac

D.

adlog

Question 10

What is the name of the VPN kernel process?

Options:

A.

VPND

B.

CVPND

C.

FWK

D.

VPNK

Question 11

The Check Point Watch Daemon (CPWD) monitors critical Check Point processes, terminating them or restarting them as needed to maintain consistent, stable operating conditions. When checking the status/output of CPWD you are able to see some columns like APP, PID, STAT, START, etc. What is the column "STAT" used for?

Options:

A.

Shows the Watch Dog name of the monitored process

B.

Shows the status of the monitored process

C.

Shows how many times the Watch Dog started the monitored process

D.

Shows what monitoring method Watch Dog is using to track the process

Question 12

VPN issues may result from misconfiguration communication failure, or incompatible default configurations between peers.Which basic command syntax needs to be used for troubleshooting Site-toSite VPN Issues?

Options:

A.

vpn truncon debug

B.

cp debug truncon

C.

fw debug truncon

D.

vpn debug truncon

Question 13

What tool would you run to diagnose logging and indexing?

Options:

A.

run cpm_doctor.sh

B.

cpstat mg -f log_server

C.

run diagnostic view

D.

run doctor-log.sh

Question 14

Which command is used to write a kernel debug to a file?

Options:

A.

fw ctl kdebug -T -I > debug.txt

B.

fw ctl debug -S -t > debug.txt

C.

fw ctl kdebug -T -f > debug.txt

D.

fw ctl debut -T -f > debug.txt

Question 15

When dealing with monolithic operating systems such as Gaia where are system calls initiated from to achieve a required system level function?

Options:

A.

Kernel Mode

B.

Slow Path

C.

Medium Path

D.

User Mode

Question 16

What components make up the Context Management Infrastructure?

Options:

A.

CPMI and FW Loader

B.

CPX and FWM

C.

CPM and SOLR

D.

CMI Loader and Pattern Matcher

Question 17

When a User Mode process suddenly crashes,it may create a core dump file.Which of the following information is available in the core dump and may be used to identify the root cause of the crash?

i. Program Counter

ii. Stack Pointer

iii. Memory management information

iv. Other Processor and OS flags / information

Options:

A.

iii and iv only

B.

i and ii only

C.

i, ii, iii and iv

D.

Only lii

Question 18

Which of these packet processing components stores Rule Base matching state-related information?

Options:

A.

Observers

B.

Classifiers

C.

Manager

D.

Handlers

Question 19

What is the correct syntax to set all debug flags for Unified Policy related issues?

Options:

A.

fw ctl kdebug-m UP all

B.

fw ctl debug-m UP all

C.

fw ctl debug -m up all

D.

fw ctl debug -m fw all

Question 20

Your users have some issues connecting with Mobile Access VPN to yourgateway.How can you debug the tunnel establishment?

Options:

A.

run vpn debug truncon

B.

in the file $VPNDIR/conf/httpd conf change the line Loglevel To LogLevel debug and run vpn restart

C.

in the file SCVPNDIR/conf/httpd conf change the line Loglevel To LogLevel debug and run cvpnrestart

D.

run fw ctl zdebug -m sslvpn all

Question 21

What is the Security Gateway directory where an administrator can find vpn debug log files generated during Site-to-Site VPN troubleshooting?

Options:

A.

SFWDIR/conf/

B.

SCPDIR/conf/

C.

SFWDIR/log/

D.

opt/CPsuiteR80/vpn/log/

Question 22

What file contains the RAD proxy settings?

Options:

A.

rad_control.C

B.

rad_scheme.C

C.

rad_services.C

D.

rad_settings.C

Question 23

What function receives theAD log event information?

Options:

A.

FWD

B.

CPD

C.

PEP

D.

ADLOG

Page: 1 / 10
Total 101 questions