Month End Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Checkpoint > CCTE > 156-587

156-587 Check Point Certified Troubleshooting Expert - R81.20 (CCTE) Question and Answers

Question # 4

What does CMI stand for in relation to the Access Control Policy?

A.

Context Manipulation Interface

B.

Context Management Infrastructure

C.

Content Management Interface

D.

Content Matching Infrastructure

Full Access
Question # 5

The Check Point Watch Daemon (CPWD) monitors critical Check Point processes, terminating them or restarting them as needed to maintain consistent, stable operating conditions. When checking the status/output of CPWD you are able to see some columns like APP, PID, STAT, START, etc. What is the column "STAT" used for?

A.

Shows the Watch Dog name of the monitored process

B.

Shows the status of the monitored process

C.

Shows how many times the Watch Dog started the monitored process

D.

Shows what monitoring method Watch Dog is using to track the process

Full Access
Question # 6

What process monitors terminates, and restarts critical Check Point processes as necessary?

A.

CPM

B.

FWD

C.

CPWD

D.

FWM

Full Access
Question # 7

The Check Point Firewall Kernel is the core component of the Gaia operating system and an integral part of traffic inspection process.There are two procedures available for debugging the firewall kernel.Which procedure/command is used for detailed troubleshooting and needs more resources?

A.

fw ctl zdebug

B.

fw debug/kdebug

C.

fw ctl debug/kdebug

D.

fw debug/kdebug ctl

Full Access
Question # 8

What components make up the Context Management Infrastructure?

A.

CPMI and FW Loader

B.

CPX and FWM

C.

CPM and SOLR

D.

CMI Loader and Pattern Matcher

Full Access
Question # 9

What is NOT a benefit of the‘fw ctl zdebug’command?

A.

Automatically allocate a 1MB buffer

B.

Collect debug messages from the kernel

C.

Cannot be used to debug additional modules

D.

Clean the buffer

Full Access
Question # 10

You modified kernel parameters and after rebooting the gateway, a lot of production traffic gets dropped and the gateway acts strangely What should you do"?

A.

Run command fw ctl set int fw1_kernel_all_disable=1

B.

Restore fwkem.conf from backup and reboot the gateway

C.

run fw unloadlocal to remove parameters from kernel

D.

Remove all kernel parameters from fwkem.conf and reboot

Full Access
Question # 11

Which of the following file is commonly associated with troubleshooting crashes on a system such as the Security Gateway?

A.

tcpdump

B.

core dump

C.

fw monitor

D.

CPMILdump

Full Access
Question # 12

When URL category is not found in the kernel cache,what action will GW do?

A.

RAD In user space will forward request to the cloud

B.

GW will update kernel cache during next policy install

C.

RAD in kernel space will forward request to the cloud

D.

RAD forwards this request to CMI which is the brain of inspection

Full Access
Question # 13

What tool would you run to diagnose logging and indexing?

A.

run cpm_doctor.sh

B.

cpstat mg -f log_server

C.

run diagnostic view

D.

run doctor-log.sh

Full Access
Question # 14

The FileApp parser in the Content Awareness engine does not extract text from which of the following file types?

A.

Microsoft Office Excel files

B.

Microsoft Office PowerPoint files

C.

Microsoft Office.docx files

D.

PDFs

Full Access
Question # 15

What command(s) will turn off all vpn debug collection?

A.

vpn debug -a off

B.

fw ctl debug 0

C.

vpn debug off

D.

vpn debug off and vpn debug Ikeoff

Full Access
Question # 16

Captive Portal,PDP and PEP run in what space?

A.

User

B.

CPM

C.

FWD

D.

Kernel

Full Access
Question # 17

Check Point Access Control Daemons contains several daemons for Software Blades and features.Which Daemon is used forApplication & Control URL Filtering?

A.

pdpd

B.

rad

C.

cprad

D.

pepd

Full Access
Question # 18

What is the best way to resolve an issue caused by a frozen process?

A.

Power off the machine

B.

Restart the process

C.

Reboot the machine

D.

Kill the process

Full Access
Question # 19

Which of the following commands can be used to see the list of processes monitored by the Watch Dog process?

A.

cpstat fw -f watchdog

B.

fw ctl get str watchdog

C.

cpwd_admin list

D.

ps -ef | grep watchd

Full Access
Question # 20

Like a Site-to-Site VPN between two Security Gateways, a Remote Access VPN relies on the Internet Key Exchange (IKE) what types of keys are generated by IKE during negotiation?

A.

Produce a symmetric key on both sides

B.

Produce an asymmetric key on both sides

C.

Symmetric keys based on pre-shared secret

D.

Produce a pair of public and private keys

Full Access
Question # 21

You are using the identity Collector with identityAwareness in large environment.Users report that they cannot access resources on Internet You identify that the traffic is matching the cleanup rule

Instead of the proper rule with Access Roles using the IDC How can you check if IDC is working?

A.

pdp connections idc

B.

ad query I debug on

C.

pep debug idc on

D.

pdp debug set IDP all

Full Access
Question # 22

Where will the usermode core files located?

A.

$FWDIRVar/log/dump/usermode

B.

/var/suroot

C.

/var/log/dump/usermode

D.

$CPDIR/var/log/dump/usermode

Full Access
Question # 23

What are the three main component of Identity Awareness?

A.

Client, SMS and Secure Gateway

B.

Identity Source Identity Server (POP) and Identity Enforcement (PEP)

C.

Identity Awareness Blade on Security Gateway, User Database on Security Management Server andActive Directory

D.

User, Active Directory and Access Role

Full Access