Summer Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Checkpoint 156-587 Check Point Certified Troubleshooting Expert - R81.20 (CCTE) Exam Practice Test

Page: 1 / 11
Total 109 questions

Check Point Certified Troubleshooting Expert - R81.20 (CCTE) Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$43.75  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$38.5  $109.99
Question 1

What are the main components of Check Point’s Security Management architecture?

Options:

A.

Management server, Log server, Gateway server. Security server

B.

Management server, management database, log server, automation server

C.

Management server. Security Gateway. Multi-Domain Server. SmartEvent Server

D.

Management server. Log Server, LDAP Server, Web Server

Question 2

For Identity Awareness, what is the PDP process?

Options:

A.

Identity server

B.

Log Sifter

C.

Captive Portal Service

D.

UserAuth Database

Question 3

If the cpsemd process of SmartEvent has crashed or is having trouble coming up, then it usually indicates that __________.

Options:

A.

The SmartEvent core on the Solr indexer has been deleted

B.

The loqqed in administrator does not have permissions to run SmartEvent

C.

Postgres database is down

D.

Cpd daemon is unable to connect to the log server

Question 4

Captive Portal, PDP and PEP run in what space?

Options:

A.

User

B.

CPM

C.

FWD

D.

Kernel

Question 5

How many packets are needed to establish IKEv1?

Options:

A.

Only three packets for main mode

B.

8

C.

5

D.

6

Question 6

An administrator receives reports about issues with log indexing and text searching regarding an existing Management Server. In trying to find a solution she wants to check if the process responsible for this feature is running correctly. What is true about the related process?

Options:

A.

cpd needs to be restarted manual to show in the list

B.

fwm manaqes this database after initialization of the 1CA

C.

solr is a child process of cpm

D.

fwssd crashes can affect therefore not show in the list

Question 7

In Mobile Access VPN. clientless access is done using a web browser. The primary communication path for these browser based connections is a process that allows numerous processes to utilize port

443 and redirects traffic to a designated port of the respective process Which daemon handles this?

Options:

A.

Multi-portal Daemon (MPD)

B.

Mobile Access Daemon (MAD)

C.

HTTPS Inspection Daemon (HID)

D.

Connectra VPN Daemon (cvpnd)

Question 8

What component is NOT part of Unified policy manager?

Options:

A.

Classifier

B.

CMI

C.

Handle

D.

Observer

Question 9

Which two files contain the Application Database on the Security Gateway?

Options:

A.

api_db.C and api_custom_db.C

B.

apcl_db.C and apd_custom_db.C

C.

application_db.C and application_custom_db.C

D.

appi_db.C and appi_custom_db.C

Question 10

What is NOT a benefit of the ‘fw ctl zdebug’ command?

Options:

A.

Automatically allocate a 1MB buffer

B.

Collect debug messages from the kernel

C.

Cannot be used to debug additional modules

D.

Clean the buffer

Question 11

In Check Point's Packet Processing Infrastructure what is the role of Observers?

Options:

A.

Observers attach object IDs to traffic

B.

They store Rule Base matching state related information

C.

Observers monitor the state of Check Point gateways and report it to the security manager

D.

Observers decide whether or not to publish a CLOB to the Security Policy

Question 12

You receive complains that Guest Users cannot login and use the Guest Network which is configured with Access Role of Guest Users. You need to verity the Captive Portal configuration. Where can

you find the config file?

Options:

A.

on the gateway at $NACPORTAL_ HOME/conf/httpd_ nac.conf

B.

on the management at SCPNAC_ HOME/conf/httpd_ nac.conf

C.

on the management at SNACPORTAL_ HOME/conf/httpd_ nac.conf

D.

on the gateway at $CPNAC_ HOME/conf/httpd_ nac.conf

Question 13

User defined URLS and HTTPS inspection User defined URLs on the Security Gateway are stored in which database file?

Options:

A.

https_urif.bin

B.

urlf db.bin

C.

urtf_https.bin

D.

https_db.bin

Question 14

You found out that $FWDIR/Iog/fw.log is constantly growing in size at a Security Gateway, what is the reason?

Options:

A.

TCP state logging is enabled

B.

Its not a problem the gateways is logging connections and also sessions

C.

fw.log can grow when GW does not have space in logging directory

D.

The GW is logging locally

Question 15

What command would you run to verify the communication between the Security Gateway and the Identity Collector?

Options:

A.

fw ctl debug -m IDAPI

B.

pdp connections idc

C.

fw ctl debug -m fw + nac

D.

adlog

Question 16

The packet processing infrastructure consists of 4 components. Which component contains the CLOB, the object that contains information about the packet that is needed to make security decisions?

Options:

A.

Manager

B.

Classifiers

C.

Handlers

D.

Observers

Question 17

You are seeing output from the previous kernel debug. What command should you use to avoid that?

Options:

A.

fw ctl clean buffer = 0

B.

fw ctl debug 0

C.

fw ctl zdebug disable

D.

fw ctl debug = 0

Question 18

VPNs allow traffic to pass through the Internet securely by encrypting the traffic as it enters the VPN tunnel and decrypting the traffic as it exits. Which process is responsible for Mobile VPN connections?

Options:

A.

cvpnd

B.

fwk

C.

vpnd

D.

vpnk

Question 19

When a User process or program suddenly crashes, a core dump is often used to examine the problem Which command is used to enable the core-dumping via GAIA clish?

Options:

A.

set core-dump enable

B.

set core-dump total

C.

set user-dump enable

D.

set core-dump per_process

Question 20

The Check Point Firewall Kernel is the core component of the Gaia operating system and an integral part of traffic inspection process. There are two procedures available for debugging the firewall kernel. Which procedure/command is used for detailed troubleshooting and needs more resources?

Options:

A.

fw ctl zdebug

B.

fw debug/kdebug

C.

fw ctl debug/kdebug

D.

fw debug/kdebug ctl

Question 21

VPN issues may result from misconfiguration communication failure, or incompatible default configurations between peers. Which basic command syntax needs to be used for troubleshooting Site-toSite VPN Issues?

Options:

A.

vpn truncon debug

B.

cp debug truncon

C.

fw debug truncon

D.

vpn debug truncon

Question 22

Which of the following inputs is suitable for debugging HTTPS inspection issues?

Options:

A.

fw debug tls on TDERROR_ALL_ALL=5

B.

fw ctl debug -m fw + conn drop cptls

C.

vpn debug cptls on

D.

fw diag debug tls enable

Question 23

URL Filtering is an essential part of Web Security in the Gateway. For the Security Gateway to perform a URL lookup when a client makes a URL request, where is the sync-request forwarded from if a sync-request is required?

Options:

A.

URLF Kernel Client

B.

RAD User Space

C.

RAD Kernel Space

D.

URLF Online Service

Question 24

What version of Check Point can Security Gateways begin dynamically distributing Logs between log servers?

Options:

A.

R81

B.

R77

C.

R30

D.

R75

Question 25

What is the name of the VPN kernel process?

Options:

A.

VPND

B.

CVPND

C.

FWK

D.

VPNK

Question 26

What is the proper command for allowing the system to create core files?

Options:

A.

service core-dump start

B.

SFWDIR/scripts/core-dump-enable.sh

C.

set core-dump enable

>save config

D.

# set core-dump enable

# save config

Question 27

When a User Mode process suddenly crashes, it may create a core dump file. Which of the following information is available in the core dump and may be used to identify the root cause of the crash?

i. Program Counter

ii. Stack Pointer

iii. Memory management information

iv. Other Processor and OS flags / information

Options:

A.

iii and iv only

B.

i and ii only

C.

i, ii, iii and iv

D.

Only lii

Question 28

When dealing with monolithic operating systems such as Gaia where are system calls initiated from to achieve a required system level function?

Options:

A.

Kernel Mode

B.

Slow Path

C.

Medium Path

D.

User Mode

Question 29

What Check Point process controls logging?

Options:

A.

FWD

B.

CPVVD

C.

CPM

D.

CPD

Question 30

During firewall kernel debug with fw ctl zdebug you received less information that expected. You noticed that a lot of messages were lost since the time the debug was started. What should you do to

resolve this issue?

Options:

A.

Increase debug buffer Use fw ctl debug -buf 32768

B.

Redirect debug output to file; Use fw ctl debug -o /debug.elg

C.

Redirect debug output to file; Use fw ctl zdebug -o /debug.elg

D.

Increase debug buffer; Use fw ctl zdebug -buf 32768

Question 31

The FileApp parser in the Content Awareness engine does not extract text from which of the following file types?

Options:

A.

Microsoft Office Excel files

B.

Microsoft Office PowerPoint files

C.

Microsoft Office.docx files

D.

PDFs

Question 32

You receive reports that Users cannot browse internet sites. You are using identity awareness with AD Query and Identity Collector in addition you have the Browser Based Authentication Enabled. What command can be used to debug the problem?

Options:

A.

on the gateway: ad debug on

B.

on the gateway: ad query debug on

C.

on the management: ad query debug extended

D.

on the gateway: pdp debug nac extended

Page: 1 / 11
Total 109 questions