Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the Checkpoint CCTE 156-587 Questions and answers with ValidTests

Exam 156-587 All Questions
Exam 156-587 Premium Access

View all detail and faqs for the 156-587 exam

Viewing page 4 out of 4 pages
Viewing questions 31-40 out of questions
Questions # 31:

What file contains the RAD proxy settings?

Options:

A.

rad_control.C

B.

rad_scheme.C

C.

rad_services.C

D.

rad_settings.C

Expert Solution
Questions # 32:

What are the four main database domains?

Options:

A.

Local, Global, User, VPN

B.

System. Global. Log. Event

C.

System, User, Global. Log

D.

System, User, Host, Network

Expert Solution
Questions # 33:

Which of the following inputs is suitable for debugging HTTPS inspection issues?

Options:

A.

fw debug tls on TDERROR_ALL_ALL=5

B.

fw ctl debug -m fw + conn drop cptls

C.

vpn debug cptls on

D.

fw diag debug tls enable

Expert Solution
Questions # 34:

You need to run a kernel debug over a longer period of time as the problem occurs only once or twice a week Therefore you need to add a timestamp to the kernel debug and write the output to a file. What is the correct syntax for this?

Options:

A.

fw ctl debug -T -f > filename debug

B.

fw ctl kdebug -T -f -o filename debug

C.

fw ell kdebug -T > filename debug

D.

fw ctl kdebug -T -f > filename.debug

Expert Solution
Questions # 35:

You need to run a kernel debug over a longer period of time as the problem occurs only once or twice a week. Therefore you need to add a timestamp to the kernel debug and write the output to a file

but you cant afford to fill up all the remaining disk space and you only have 10 GB free for saving the debugs What is the correct syntax for this?

Options:

A.

A fw ctl kdebug -T -f -m 10 -s 1000000 -o debugfilename

B.

fw ctl debug -T -f-m 10 -s 1000000 -o debugfilename

C.

fw ctl kdebug -T -f -m 10 -s 1000000 > debugfilename

D.

fw ctl kdebug -T -m 10 -s 1000000 -o debugfilename

Expert Solution
Questions # 36:

What command is usually used for general firewall kernel debugging and what is the size of the buffer that is automatically enabled when using the command?

Options:

A.

fw ctl debug, buffer size is 1024 KB

B.

fw ctl zdebug, buffer size is 1 MB

C.

fw ctl kdebug, buffer size is 32000 KB

D.

fw ctl zdebug, buffer size is 32768 KB

Expert Solution
Questions # 37:

For Identity Awareness, what is the PDP process?

Options:

A.

Identity server

B.

Log Sifter

C.

Captive Portal Service

D.

UserAuth Database

Expert Solution
Questions # 38:

Which two files contain the Application Database on the Security Gateway?

Options:

A.

api_db.C and api_custom_db.C

B.

apcl_db.C and apd_custom_db.C

C.

application_db.C and application_custom_db.C

D.

appi_db.C and appi_custom_db.C

Expert Solution
Questions # 39:

The Check Point Firewall Kernel is the core component of the Gaia operating system and an integral part of the traffic inspection process. There are two procedures available for debugging the firewall kernel. Which procedure/command is used for troubleshooting packet drops and other kernel activities while using minimal resources (1 MB buffer)?

Options:

A.

fw ctl zdebug

B.

fwk ell debug

C.

fw debug ctl

D.

fw ctl debug/kdebug

Expert Solution
Questions # 40:

What components make up the Context Management Infrastructure?

Options:

A.

CPMI and FW Loader

B.

CPX and FWM

C.

CPM and SOLR

D.

CMI Loader and Pattern Matcher

Expert Solution
Viewing page 4 out of 4 pages
Viewing questions 31-40 out of questions