Special Summer Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

156-582 Sample Questions Answers

Questions 4

Is it possible to analyze ICMP packets with tcpdump?

Options:

A.

Yes, tcpdump is not limited to TCP specific issues

B.

No, use fw monitor instead

C.

No, tcpdump works from layer 4. ICMP is located in the network layer (layer 3), therefore is not applicable to this scenario

D.

No, since ICMP does not have any source or destination ports, but specification of port numbers is mandatory

Buy Now
Questions 5

You need to capture NAT information into packet capture, what tool is the best suitable for this task?

Options:

A.

tcpdump

B.

fw monitor

C.

cppcap

D.

fw ctl zdebug + xlate xltrc nat

Buy Now
Questions 6

What is a primary advantage of using the fw monitor tool?

Options:

A.

It is menu-driven, making it easy to configure

B.

It can capture packets in various positions as they move through the firewall

C.

It has no negative impact on firewall performance

D.

It always captures all packets hitting the physical layer

Buy Now
Questions 7

After manipulating the rulebase and objects with SmartConsole the application crashes and closes immediately. To troubleshoot, you will need to review the crash report. In which directory on the host PC will you find this report?

Options:

A.

\data\crash_report\

B.

\data\crash_report\

C.

\data\crash_report

D.

\crash_report\data\

Buy Now
Questions 8

What file extension should be used with fw monitor to allow the output file to be imported and read in Wireshark?

Options:

A.

.pea

B.

.exe

C.

.cap

D.

.tgz

Buy Now
Questions 9

Which of the following is NOT an account user classification?

Options:

A.

Licensers

B.

Manager

C.

Viewer

D.

Administrator

Buy Now
Questions 10

When running a debug with fw monitor, which parameter will create a more verbose output?

Options:

A.

-I

B.

-i

C.

V

D.

-D

Buy Now
Questions 11

The Check Point FW Monitor tool captures and analyzes incoming packets at multiple points in the traffic inspections. Which of the following is the correct inspection flow for traffic?

Options:

A.

(i) - pre-inbound, (I) - post-inbound, (o) - pre-outbound, (O) - post-outbound

B.

(o) - pre-outbound, (O) - post-inbound, (i) - pre-inbound, (I) - post-inbound

C.

(O) - post-outbound, (o) - pre-outbound, (I) - post-inbound, (i) - pre-inbound

D.

(1) - pre-inbound, (i) - post-inbound, (O) - pre-outbound, (o) - post-outbound

Buy Now
Questions 12

What is the name of a protocol for VPN establishment and negotiation?

Options:

A.

NAT-T

B.

IPsec

C.

VPN

D.

IKE

Buy Now
Questions 13

Application Control and URL Filtering update files are located in which directory?

Options:

A.

SCPDIR/appi/update

B.

SFWDIR/conf/update

C.

SCPDIR/apci/update

D.

SFWDIR/appi/update/

Buy Now
Questions 14

The communication between the Security Management Server and Security Gateway to forward logs is done using the following process and port number:

Options:

A.

fwd, TCP 257

B.

cpm, 19009

C.

fwm, TCP 18190

D.

fwm, TCP 257

Buy Now
Questions 15

To verify that communication is working between the Security Management Server and the Security Gateway, which service port should be checked?

Options:

A.

257

B.

18209

C.

259

D.

19009

Buy Now
Questions 16

Which of the following would be the most appropriate command in debugging a HideNAT issue?

Options:

A.

fw ctl zdebug + fwn allnat

B.

fw ctl zdebug + dynamic natips natports

C.

fw ctl zdebug + xlate xltrc nat

D.

fw ctl zdebug + fwxalloc hidenat

Buy Now
Questions 17

After deploying a new Static NAT configuration, traffic is not getting through. What command would you use to verify that the proxy ARP configuration has been loaded?

Options:

A.

fw ctl conn

B.

fw ctl arp

C.

fw arp ctl

D.

cp ctl arp

Buy Now
Questions 18

After deploying a Hide NAT for a new network, users are unable to access the Internet. What command would you use to check the internal NAT behavior?

Options:

A.

cp ctl kdebug + xlate xltrc nat

B.

fw ctl zdebug + xlate xltrc nat

C.

cp ctl zdebug + xlate xltrc nat

D.

fw ctl kdebug + xlate xltrc nat

Buy Now
Questions 19

What Check Point process controls logging?

Options:

A.

CPWD

B.

FWD

C.

CPD

D.

CPM

Buy Now
Questions 20

When is the Enable Bypass Under Load used in IPS?

Options:

A.

When the threshold is reached for connections and throughput

B.

When there is a problem with IPS and connectivity cannot be guaranteed

C.

When the threshold is reached for CPU and memory

D.

When there is an ongoing attack, the Security Gateway puts its state to maintenance mode to prevent attackers from breaching the network

Buy Now
Questions 21

The URL filtering cache limit exceeded. What issues can this cause?

Options:

A.

When URL filtering cache exceeds the limit, it will be disabled temporarily to overcome instability of the system

B.

RAD process will spawn multiple times to help populate the cache

C.

Resource Advisor (RAD) process on the Security Gateway consumes close to 100 percent of the CPU

D.

Nothing, the Security Gateway dynamically raises the cache when needed

Buy Now
Questions 22

What are the available types of licenses in Check Point?

Options:

A.

Evaluation, Perpetual, Trial, Subscription

B.

Evaluation, Perpetual, Test, Free

C.

Free, Evaluation, Annual, Lifetime

D.

Annual, Perpetual, Test, Free

Buy Now
Exam Code: 156-582
Exam Name: Check Point Certified Troubleshooting Administrator - R81.20 (CCTA)
Last Update: Apr 1, 2025
Questions: 75
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now 156-582