New Year Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Checkpoint > CCTA > 156-582

156-582 Check Point Certified Troubleshooting Administrator - R81.20 (CCTA) Question and Answers

Question # 4

In the Security Management Architecture, what port and process SmartConsole uses to communicate with the management server?

A.

CPM 19009 and 18191

B.

CPM and 18190

C.

CPM and 19009

D.

FWM and 19009

Full Access
Question # 5

Which of the following allows you to capture packets at four inspection points as they traverse a Check Point gateway?

A.

tcpdump

B.

Firewall logs

C.

Kernel debugs

D.

fw monitor

Full Access
Question # 6

What are two types of SAs in the VPN negotiation?

A.

IKE and VPND SA

B.

IKE SA and VPN SA

C.

IKE SA and IPsec SA

D.

VPN SA and Main SA

Full Access
Question # 7

What is the most efficient way to view large fw monitor captures and run filters on the file?

A.

snoop

B.

CLI

C.

CLISH

D.

Wireshark

Full Access
Question # 8

How would you check the connection status of a gateway to the Log server?

A.

Run netstat -anp | grep :257 in CLISH on Log server

B.

Run netstat -anp | grep :257 in expert mode on Log server

C.

Run netstat -anp | grep :18187 in expert mode on Log server

D.

Run netstat -anp | grep :18187 in CLISH on Log server

Full Access
Question # 9

What is the default protection profile for Autonomous Threat Prevention?

A.

Perimeter

B.

Guest

C.

Internal

D.

Bypass

Full Access
Question # 10

Which of the following is the most significant impact of not having a valid Policy Management license installed on a management server?

A.

Inability to make rule changes

B.

Inability to install policies

C.

Inability to review logs

D.

Inability to log in to SmartConsole

Full Access
Question # 11

What are the available types of licenses in Check Point?

A.

Evaluation, Perpetual, Trial, Subscription

B.

Evaluation, Perpetual, Test, Free

C.

Free, Evaluation, Annual, Lifetime

D.

Annual, Perpetual, Test, Free

Full Access
Question # 12

After deploying a Hide NAT for a new network, users are unable to access the Internet. What command would you use to check the internal NAT behavior?

A.

cp ctl kdebug + xlate xltrc nat

B.

fw ctl zdebug + xlate xltrc nat

C.

cp ctl zdebug + xlate xltrc nat

D.

fw ctl kdebug + xlate xltrc nat

Full Access
Question # 13

Check Point provides tools & commands to help you identify issues about products and applications. Which Check Point command can help you display status and statistics information for various Check Point products and applications?

A.

cpstat

B.

CP-stat

C.

CPview

D.

fwstat

Full Access
Question # 14

The communication between the Security Management Server and Security Gateway to forward logs is done using the following process and port number:

A.

fwd, TCP 257

B.

cpm, 19009

C.

fwm, TCP 18190

D.

fwm, TCP 257

Full Access
Question # 15

Customer wants to use autonomous threat prevention. How do you enable it?

A.

Enable Autonomous Threat Prevention on the Security Gateway from the SmartConsole: Gateway and Servers view and enable IPS on the Security Gateway by the command: ips on.

B.

Enable Autonomous Threat Prevention on the Security Gateway from the SmartConsole:Gateway and Servers view, the default profile Strict Security will be selected.

C.

Enable Autonomous Threat Prevention on the Security Gateway from the SmartConsole: Gateway and Servers view, inspection profile is not needed, the Security Gateway will automatically select the best profile according to deployment.

D.

Enable Autonomous Threat Prevention on the Security Gateway from the SmartConsole: Gateway and Servers view, then select inspection profile.

Full Access
Question # 16

SmartConsole closes immediately, what is the most likely reason?

A.

The process crashed in kernel space

B.

The process crashed in user space

C.

The user idle time expired and SmartConsole disconnected the user

D.

The Security Management server rejected the client connection

Full Access
Question # 17

You were asked to set up logging for a rule to log a full list of URLs when the rule hits in the Rule Base. How do you accomplish that?

A.

Set Extended logging under rule log type

B.

Click on the rule, column logging and set "log URL" under application control blade layer

C.

All URLs are logged by default

D.

For URL logging you need to modify blade settings of URL filtering blade under SmartConsole, Manage & Settings, blades, URL filtering

Full Access
Question # 18

As a security administrator/engineer in your company, you have noticed that your HQ Check Point Security Management Server is not receiving logs from your HQ Check Point Gateway/Cluster. To investigate this issue in the command line, you will need to verify which process is running?

A.

cpm

B.

cpd

C.

fwd

D.

fwm

Full Access
Question # 19

Which of the following System Monitoring Commands (Linux) shows process resource utilization, as well as CPU and memory utilization?

A.

df

B.

free

C.

ps

D.

top

Full Access
Question # 20

What is the port for the Log Collection on Security Management Server?

A.

18191

B.

443

C.

258

D.

257

Full Access
Question # 21

Application Control and URL Filtering update files are located in which directory?

A.

SCPDIR/appi/update

B.

SFWDIR/conf/update

C.

SCPDIR/apci/update

D.

SFWDIR/appi/update/

Full Access
Question # 22

Which of the following is NOT a way to insert fw monitor into the chain when troubleshooting packets throughout the chain?

A.

Relative position using id

B.

Absolute position

C.

Relative position using location

D.

Relative position using alias

Full Access