Special Summer Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

156-587 Sample Questions Answers

Questions 4

What file contains the RAD proxy settings?

Options:

A.

rad_control.C

B.

rad_scheme.C

C.

rad_services.C

D.

rad_settings.C

Buy Now
Questions 5

What is the Security Gateway directory where an administrator can find vpn debug log files generated during Site-to-Site VPN troubleshooting?

Options:

A.

SFWDIR/conf/

B.

SCPDIR/conf/

C.

SFWDIR/log/

D.

opt/CPsuiteR80/vpn/log/

Buy Now
Questions 6

An administrator receives reports about issues with log indexing and text searching regarding an existing Management Server. In trying to find a solution she wants to check if the process responsible for this feature is running correctly. What is true about the related process?

Options:

A.

cpd needs to be restarted manual to show in the list

B.

fwm manaqes this database after initialization of the 1CA

C.

solr is a child process of cpm

D.

fwssd crashes can affect therefore not show in the list

Buy Now
Questions 7

You receive reports from multiple users that they cannot browse Upon further discovery you identify that Identity Awareness cannot identify the users properly and apply the configuredAccess Roles

What commands you can use to troubleshoot all identity collectors and identity providers from the command line?

Options:

A.

on the gateway:pdp debug set IDC all IDP all

B.

on the gateway:pdp debug set AD all and IDC all

C.

on the management:pdp debug on IDC all

D.

on the management: pdp debug set all

Buy Now
Questions 8

Which command is used to write a kernel debug to a file?

Options:

A.

fw ctl kdebug -T -I > debug.txt

B.

fw ctl debug -S -t > debug.txt

C.

fw ctl kdebug -T -f > debug.txt

D.

fw ctl debut -T -f > debug.txt

Buy Now
Questions 9

Like a Site-to-Site VPN between two Security Gateways, a Remote Access VPN relies on the Internet Key Exchange (IKE) what types of keys are generated by IKE during negotiation?

Options:

A.

Produce a symmetric key on both sides

B.

Produce an asymmetric key on both sides

C.

Symmetric keys based on pre-shared secret

D.

Produce a pair of public and private keys

Buy Now
Questions 10

Captive Portal,PDP and PEP run in what space?

Options:

A.

User

B.

CPM

C.

FWD

D.

Kernel

Buy Now
Questions 11

What is the function of the Core Dump Manager utility?

Options:

A.

To determine which process is slowing down the system

B.

To send crash information to an external analyzer

C.

To limit the number of core dump files per process as well as the total amount of disk space used by core files

D.

To generate a new core dump for analysis

Buy Now
Questions 12

During firewall kernel debug with fw ctl zdebug you received less information that expected. You noticed that a lot of messages were lost sincethe time the debug was started.What should you do to

resolve this issue?

Options:

A.

Increase debug buffer Use fw ctl debug -buf 32768

B.

Redirect debug output to file; Use fw ctl debug -o /debug.elg

C.

Redirect debug output to file; Use fw ctl zdebug -o /debug.elg

D.

Increase debug buffer; Use fw ctl zdebug -buf 32768

Buy Now
Questions 13

After kernel debug with “fw ctl debug you received a huge amount of information It was saved in a very large file that is difficult to open and analyze with standard text editors Suggest a solution to

solve this issue

Options:

A.

Reduce debug buffer to 1024KB and run debug for several times

B.

Use Check Point InfoView utility to analyze debug output

C.

Use “fw ctl zdebug because of 1024KB buffer size

D.

Divide debug information into smaller files. Use “ fw ctl kdebug -f -o “filename -m 25 - s‘’1024’’

Buy Now
Questions 14

Check Point Access Control Daemons contains several daemons for Software Blades and features.Which Daemon is used forApplication & Control URL Filtering?

Options:

A.

pdpd

B.

rad

C.

cprad

D.

pepd

Buy Now
Questions 15

You are using the identity Collector with identityAwareness in large environment.Users report that they cannot access resources on Internet You identify that the traffic is matching the cleanup rule

Instead of the proper rule with Access Roles using the IDC How can you check if IDC is working?

Options:

A.

pdp connections idc

B.

ad query I debug on

C.

pep debug idc on

D.

pdp debug set IDP all

Buy Now
Questions 16

Which of these packet processing components stores Rule Base matching state-related information?

Options:

A.

Observers

B.

Classifiers

C.

Manager

D.

Handlers

Buy Now
Questions 17

What is the name of the VPN kernel process?

Options:

A.

VPND

B.

CVPND

C.

FWK

D.

VPNK

Buy Now
Questions 18

The Check Point Firewall Kernel is the core component of the Gaia operating system and an integral part ofthe traffic inspection process.There are two procedures available for debugging the firewall kernel.Which procedure/command is used for troubleshooting packet drops and other kernel activities while using minimal resources (1 MB buffer)?

Options:

A.

fw ctl zdebug

B.

fwk ell debug

C.

fw debug ctl

D.

fw ctl debug/kdebug

Buy Now
Questions 19

For identity Awareness what is the PDP process?

Options:

A.

Identity server

B.

Captive Portal Service

C.

User Auth Database

D.

Log Sifter

Buy Now
Questions 20

What function receives theAD log event information?

Options:

A.

FWD

B.

CPD

C.

PEP

D.

ADLOG

Buy Now
Questions 21

What is the buffer size set by the fw ctl zdebug command?

Options:

A.

8GB

B.

1 MB

C.

1 GB

D.

8 MB

Buy Now
Exam Code: 156-587
Exam Name: Check Point Certified Troubleshooting Expert - R81.20 (CCTE)
Last Update: Mar 31, 2025
Questions: 101
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now 156-587