Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Checkpoint 156-587 Dumps

Page: 1 / 10
Total 101 questions

Check Point Certified Troubleshooting Expert - R81.20 (CCTE) Questions and Answers

Question 1

The Check Point Firewall Kernel is the core component of the Gaia operating system and an integral part of traffic inspection process.There are two procedures available for debugging the firewall kernel.Which procedure/command is used for detailed troubleshooting and needs more resources?

Options:

A.

fw ctl zdebug

B.

fw debug/kdebug

C.

fw ctl debug/kdebug

D.

fw debug/kdebug ctl

Question 2

In Check Point's Packet Processing Infrastructure what is the role of Observers?

Options:

A.

Observers attach object IDs to traffic

B.

They store Rule Base matching state related information

C.

Observers monitor the state of Check Point gateways and report it to the security manager

D.

Observers decide whether or not to publish a CLOB to the Security Policy

Question 3

You need to run a kernel debug over a longer period of time as the problem occurs only once or twice a week Therefore you need to add a timestamp to the kernel debug and write the output to a file.What is the correct syntax for this?

Options:

A.

fw ctl debug -T -f > filename debug

B.

fw ctl kdebug -T -f -o filename debug

C.

fw ell kdebug -T > filename debug

D.

fw ctl kdebug -T -f > filename.debug

Question 4

When a user space process or program suddenly crashes, what type of file is created for analysis

Options:

A.

core dump

B.

kernel_memory_dump dbg

C.

core analyzer

D.

coredebug

Question 5

The FileApp parser in the Content Awareness engine does not extract text from which of the following file types?

Options:

A.

Microsoft Office Excel files

B.

Microsoft Office PowerPoint files

C.

Microsoft Office.docx files

D.

PDFs

Question 6

Which of the following is contained in the System Domain of the Postgres database?

Options:

A.

Trusted GUI clients

B.

Configuration data of log servers

C.

Saved queries for applications

D.

User modified configurations such as network objects

Question 7

What is the correct syntax to set all debug flags for Unified Policy related issues?

Options:

A.

fw ctl kdebug-m UP all

B.

fw ctl debug-m UP all

C.

fw ctl debug -m up all

D.

fw ctl debug -m fw all

Question 8

What is the shorthand reference for a classification object?

Options:

A.

classobj

B.

CLOB

C.

COBJ

D.

class.obj

Question 9

Which of the following daemons is used for Threat Extraction?

Options:

A.

extractd

B.

tedex

C.

tex

D.

scrubd

Question 10

The Check Point Firewall Kernel is the core component of the Gaia operating system and an integral part ofthe traffic inspection process.There are two procedures available for debugging the firewall kernel.Which procedure/command is used for troubleshooting packet drops and other kernel activities while using minimal resources (1 MB buffer)?

Options:

A.

fw ctl zdebug

B.

fwk ell debug

C.

fw debug ctl

D.

fw ctl debug/kdebug

Question 11

What is the kernel process for Content Awareness that collects the data from the contexts received from the CMI and decides if the file is matched by a data type?

Options:

A.

cntawmod

B.

cntmgr

C.

dlpda

D.

dlpu

Question 12

When viewing data for CPMI objects in the Postgres database, what table column should be selected to query for the object instance?

Options:

A.

CpmiHostCkp

B.

fwset

C.

CPM Global M

D.

GuiDBedit

Question 13

Like a Site-to-Site VPN between two Security Gateways, a Remote Access VPN relies on the Internet Key Exchange (IKE) what types of keys are generated by IKE during negotiation?

Options:

A.

Produce a symmetric key on both sides

B.

Produce an asymmetric key on both sides

C.

Symmetric keys based on pre-shared secret

D.

Produce a pair of public and private keys

Question 14

Packet processing infrastructure consists of the following components EXCEPT:

Options:

A.

Observers

B.

Manager

C.

Client

D.

Classifiers

Question 15

When a User process or program suddenly crashes, a core dump is often used to examine the problem Which command is used to enable the core-dumping via GAIA clish?

Options:

A.

set core-dump enable

B.

set core-dump total

C.

set user-dump enable

D.

set core-dump per_process

Question 16

You run a free-command on a gateway and notice that the Swap column is not zero Choose the best answer

Options:

A.

Utilization of ram is high and swap file had to be used

B.

Swap file is used regularly because RAM memory is reserved for management traffic

C.

Swap memory is used for heavy connections when RAM memory is full

D.

Its ole Swap is used to increase performance

Question 17

When debugging is enabled on firewall kernel module using the fw ctl debug' command with required options, many debug messages are provided by the kernel that help the administrator to identify

Issues. Which of the following is true about these debug messages generated by the kernel module?

Options:

A.

Messages are written to /etc/dmesg file

B.

Messages are written to a buffer and collected using ‘fw ctl kdebug

C.

Messages are written to SFWDIR

D.

Messages are written to console and also /var/log/messages file

Question 18

What is NOT a benefit of the‘fw ctl zdebug’command?

Options:

A.

Automatically allocate a 1MB buffer

B.

Collect debug messages from the kernel

C.

Cannot be used to debug additional modules

D.

Clean the buffer

Question 19

Which of the following file is commonly associated with troubleshooting crashes on a system such as the Security Gateway?

Options:

A.

tcpdump

B.

core dump

C.

fw monitor

D.

CPMILdump

Question 20

You need to run a kernel debug over a longer period of time as the problem occurs only once or twice a week. Therefore you need to add a timestamp to the kernel debug and write the output to a file

but you cant afford to fill up all the remaining disk space and you only have 10 GB free for saving the debugs What is the correct syntax for this?

Options:

A.

A fw ctl kdebug -T -f -m 10 -s 1000000 -o debugfilename

B.

fw ctl debug -T -f-m 10 -s 1000000 -o debugfilename

C.

fw ctl kdebug -T -f -m 10 -s 1000000 > debugfilename

D.

fw ctl kdebug -T -m 10 -s 1000000 -o debugfilename

Question 21

What is the function of the Core Dump Manager utility?

Options:

A.

To determine which process is slowing down the system

B.

To send crash information to an external analyzer

C.

To limit the number of core dump files per process as well as the total amount of disk space used by core files

D.

To generate a new core dump for analysis

Question 22

What component is NOT part of Unified policy manager?

Options:

A.

Classifier

B.

CMI

C.

Handle

D.

Observer

Question 23

Captive Portal,PDP and PEP run in what space?

Options:

A.

User

B.

CPM

C.

FWD

D.

Kernel

Page: 1 / 10
Total 101 questions