Check Point Certified Troubleshooting Administrator - R81.20 (CCTA) Questions and Answers
Check Point provides tools & commands to help you identify issues about products and applications. Which Check Point command can help you display status and statistics information for various Check Point products and applications?
After deploying a new Static NAT configuration, traffic is not getting through. What command would you use to troubleshoot internal problems with the NAT traffic?
Which Layer of the OSI Model is responsible for routing?
Which of the following is NOT a way to insert fw monitor into the chain when troubleshooting packets throughout the chain?
As a security administrator/engineer in your company, you have noticed that your HQ Check Point Security Management Server is not receiving logs from your HQ Check Point Gateway/Cluster. To investigate this issue in the command line, you will need to verify which process is running?
Application Control and URL Filtering update files are located in which directory?
Which of the following files is commonly associated with troubleshooting crashes on a system such as SmartConsole?
What is the impact of an expired or missing contract file?
Running tcpdump causes a significant increase on CPU usage, what other option should you use?
You want to collect diagnostics data to include with an SR (Service Request). What command or utility best meets your needs?
What is the name of a protocol for VPN establishment and negotiation?
After reviewing the Install Policy report and error codes listed in it, you need to check if the policy installation port is open on the Security Gateway. What is the correct port to check?
You need to capture NAT information into packet capture, what tool is the best suitable for this task?
How many captures does the command "fw monitor -p all" take?
What is the correct process for GUI connectivity issues with SmartConsole troubleshooting?
What is the name of the Software Blade Package containing CDR (Content Disarm & Reconstruction) and Zero Day protection?
You were asked to set up logging for a rule to log a full list of URLs when the rule hits in the Rule Base. How do you accomplish that?
To verify that communication is working between the Security Management Server and the Security Gateway, which service port should be checked?
What is a primary advantage of using the fw monitor tool?
How do you verify that Proxy ARP entries are loaded into the kernel?
What is the difference between the “Super User" and “Read Write All" SmartConsole permission profiles?
Which is the correct "fw monitor" syntax for creating a capture file for loading it into Wireshark?