ExamGecko
Home Home / Checkpoint / 156-585

Checkpoint 156-585 Practice Test - Questions Answers, Page 11

Question list
Search
Search

Related questions











What acceleration mode utilizes multi-core processing to assist with traffic processing?

A.
CoreXL
A.
CoreXL
Answers
B.
SecureXL
B.
SecureXL
Answers
C.
HyperThreading
C.
HyperThreading
Answers
D.
Traffic Warping
D.
Traffic Warping
Answers
Suggested answer: C

How many tiers of pattern matching can a packet pass through during IPS inspection?

A.
2
A.
2
Answers
B.
1
B.
1
Answers
C.
5
C.
5
Answers
D.
9
D.
9
Answers
Suggested answer: A

James is using the same filter expression in fw monitor for CITRIX very often and instead of typing this all the time he wants to add it as a macro to the fw monitor definition file. What’s the name and location of this file?

A.
$FWDIR/lib/fwmonltor.def
A.
$FWDIR/lib/fwmonltor.def
Answers
B.
$FWDIR/conf/fwmonltor.def
B.
$FWDIR/conf/fwmonltor.def
Answers
C.
$FWDIR/lib/tcpip.def
C.
$FWDIR/lib/tcpip.def
Answers
D.
$FWDIR/lib/fw.monitor
D.
$FWDIR/lib/fw.monitor
Answers
Suggested answer: A

What file contains the RAD proxy settings?

A.
rad_settings.C
A.
rad_settings.C
Answers
B.
rad_services.C
B.
rad_services.C
Answers
C.
rad_scheme.C
C.
rad_scheme.C
Answers
D.
rad_control.C
D.
rad_control.C
Answers
Suggested answer: A

Your users have some issues connecting Mobile Access VPN to the gateway. How can you debug the tunnel establishment?

A.
in the file $CVPNDIR/conf/httpd.conf change the line loglevel .. To LogLevel debug and runcvpnrestart
A.
in the file $CVPNDIR/conf/httpd.conf change the line loglevel .. To LogLevel debug and runcvpnrestart
Answers
B.
run vpn debug truncon
B.
run vpn debug truncon
Answers
C.
run fw ctl zdebug -m sslvpn all
C.
run fw ctl zdebug -m sslvpn all
Answers
D.
in the file $VPNDIR/conf/httpd.conf the line Loglevel .. To LogLevel debug and run vpn restart
D.
in the file $VPNDIR/conf/httpd.conf the line Loglevel .. To LogLevel debug and run vpn restart
Answers
Suggested answer: A

Which Threat Prevention Daemon is the core Threat Emulation engine and responsible for emulation files and communications with Threat Cloud?

A.
ctasd
A.
ctasd
Answers
B.
in.msd
B.
in.msd
Answers
C.
ted
C.
ted
Answers
D.
scrub
D.
scrub
Answers
Suggested answer: C

What table does command “fwaccel conns” pull information from?

A.
fwxl_conns
A.
fwxl_conns
Answers
B.
SecureXLCon
B.
SecureXLCon
Answers
C.
cphwd_db
C.
cphwd_db
Answers
D.
sxl_connections
D.
sxl_connections
Answers
Suggested answer: A

What is the proper command for allowing the system to create core files?

A.
$FWDIR/scripts/core-dump-enable.sh
A.
$FWDIR/scripts/core-dump-enable.sh
Answers
B.
# set core-dump enable# save config
B.
# set core-dump enable# save config
Answers
C.
service core-dump start
C.
service core-dump start
Answers
D.
>set core-dump enable>save config
D.
>set core-dump enable>save config
Answers
Suggested answer: D

Which command is used to write a kernel debug to a file?

A.
fw ctl debug -T -f > debug.txt
A.
fw ctl debug -T -f > debug.txt
Answers
B.
fw ctl kdebug -T -l > debug.txt
B.
fw ctl kdebug -T -l > debug.txt
Answers
C.
fw ctl debug -S -t > debug.txt
C.
fw ctl debug -S -t > debug.txt
Answers
D.
fw ctl kdebug -T -f > debug.txt
D.
fw ctl kdebug -T -f > debug.txt
Answers
Suggested answer: D

Check Point Access Control Daemons contains several daemons for Software Blades and features.

Which Daemon is used for Application & Control Filtering?

A.
rad
A.
rad
Answers
B.
cprad
B.
cprad
Answers
C.
pepd
C.
pepd
Answers
D.
pdpd
D.
pdpd
Answers
Suggested answer: A
Total 114 questions
Go to page: of 12