Checkpoint 156-585 Practice Test - Questions Answers, Page 11

List of questions
Question 101

What acceleration mode utilizes multi-core processing to assist with traffic processing?
Question 102

How many tiers of pattern matching can a packet pass through during IPS inspection?
Question 103

James is using the same filter expression in fw monitor for CITRIX very often and instead of typing this all the time he wants to add it as a macro to the fw monitor definition file. What’s the name and location of this file?
Question 104

What file contains the RAD proxy settings?
Question 105

Your users have some issues connecting Mobile Access VPN to the gateway. How can you debug the tunnel establishment?
Question 106

Which Threat Prevention Daemon is the core Threat Emulation engine and responsible for emulation files and communications with Threat Cloud?
Question 107

What table does command “fwaccel conns” pull information from?
Question 108

What is the proper command for allowing the system to create core files?
Question 109

Which command is used to write a kernel debug to a file?
Question 110

Check Point Access Control Daemons contains several daemons for Software Blades and features.
Which Daemon is used for Application & Control Filtering?
Question