ExamGecko
Home Home / Checkpoint / 156-585

Checkpoint 156-585 Practice Test - Questions Answers, Page 4

Question list
Search
Search

List of questions

Search

Related questions











VPN's allow traffic to pass through the Internet securely by encrypting the traffic as it enters the VPN tunnel and then decrypting the exists. Which process is responsible for Mobile VPN connections?

A.
cvpnd
A.
cvpnd
Answers
B.
vpnd
B.
vpnd
Answers
C.
vpnk
C.
vpnk
Answers
D.
fwk
D.
fwk
Answers
Suggested answer: D

Which of the following is contained in the System Domain of the Postgres database?

A.
Saved queries for applications
A.
Saved queries for applications
Answers
B.
Configuration data of log servers
B.
Configuration data of log servers
Answers
C.
Trusted GUI clients
C.
Trusted GUI clients
Answers
D.
User modified configurations such as network objects
D.
User modified configurations such as network objects
Answers
Suggested answer: C

Which of the following is a component of the Context Management Infrastructure used to collect signatures in user space from multiple sources, such as Application Control and IPS. and compiles them together into unified Pattern Matchers?

A.
CMI Loader
A.
CMI Loader
Answers
B.
cpas
B.
cpas
Answers
C.
PSL - Passive Signature Loader
C.
PSL - Passive Signature Loader
Answers
D.
Context Loader
D.
Context Loader
Answers
Suggested answer: A

Rules within the Threat Prevention policy use the Malware database and network objects. Which directory is used for the Malware database?

A.
$FWDIR/conf/install_manager_tmp/ANTIMALWARE/conf/
A.
$FWDIR/conf/install_manager_tmp/ANTIMALWARE/conf/
Answers
B.
$CPDIR/conf/install_manager_lmp/ANTIMALWARE/conf/
B.
$CPDIR/conf/install_manager_lmp/ANTIMALWARE/conf/
Answers
C.
$FWDlR/conf/install_firewall_imp/ANTIMALWARE/conf/
C.
$FWDlR/conf/install_firewall_imp/ANTIMALWARE/conf/
Answers
D.
$FWDlR/log/install_manager_tmp/ANTIMALWARBlog?
D.
$FWDlR/log/install_manager_tmp/ANTIMALWARBlog?
Answers
Suggested answer: A

You need to run a kernel debug over a longer period of time as the problem occurs only once or twice a week. Therefore you need to add a timestamp to the kernel debug and write the output to a file What is the correct syntax for this?

A.
fw ctl kdebug -T -f > filename.debug
A.
fw ctl kdebug -T -f > filename.debug
Answers
B.
fw ctl kdebug -T > filename.debug
B.
fw ctl kdebug -T > filename.debug
Answers
C.
fw ctl debug -T -f > filename.debug
C.
fw ctl debug -T -f > filename.debug
Answers
D.
fw ctl kdebug -T -f -o filename.debug
D.
fw ctl kdebug -T -f -o filename.debug
Answers
Suggested answer: A

Which command do you need to execute to insert fw monitor after TCP streaming (out) in the outbound chain using absolute position? Given the chain was 1ffffe0, choose the correct answer.

A.
fw monitor –po -0x1ffffe0
A.
fw monitor –po -0x1ffffe0
Answers
B.
fw monitor –p0 ox1ffffe0
B.
fw monitor –p0 ox1ffffe0
Answers
C.
fw monitor –po 1ffffe0
C.
fw monitor –po 1ffffe0
Answers
D.
fw monitor –p0 –ox1ffffe0
D.
fw monitor –p0 –ox1ffffe0
Answers
Suggested answer: A

Explanation:

https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_PerformanceTuning_AdminGuide/Content/Topics-PTG/CLI/fw-monitor.htm


Vanessa is reviewing ike.elg file to troubleshoot failed site-to-site VPN connection After sending Mam Mode Packet 5 the response from the peer is PAYLOAD-MALFORMED" What is the reason for failed VPN connection?

A.
The authentication on Phase 1 is causing the problem.Pre-shared key on local gateway encrypted by the hash algorithm created in Packet 3 and Packet 4 doesn't match with the hash on the peer gateway generated by encrypting its pre-shared key
A.
The authentication on Phase 1 is causing the problem.Pre-shared key on local gateway encrypted by the hash algorithm created in Packet 3 and Packet 4 doesn't match with the hash on the peer gateway generated by encrypting its pre-shared key
Answers
B.
The authentication on Phase 2 is causing the problemPre-shared key on local gateway encrypted by the hash algorithm created in Packets 1 and 2 doesn't match with the hash on the peer gateway generated by encrypting its pre-shared key
B.
The authentication on Phase 2 is causing the problemPre-shared key on local gateway encrypted by the hash algorithm created in Packets 1 and 2 doesn't match with the hash on the peer gateway generated by encrypting its pre-shared key
Answers
C.
The authentication on Quick Mode is causing the problemPre-shared key on local gateway encrypted by the hash algorithm created in Packets 3 and 4 doesn't match with the hash on the peer gateway generated by encrypting its pre-shared key
C.
The authentication on Quick Mode is causing the problemPre-shared key on local gateway encrypted by the hash algorithm created in Packets 3 and 4 doesn't match with the hash on the peer gateway generated by encrypting its pre-shared key
Answers
D.
The authentication on Phase 1 is causing the problemPre-shared key on local gateway encrypted by the hash algorithm doesn't match with the hash on the peer gateway generated by encrypting its pre-shared key created in Packet 1 and Packet 2
D.
The authentication on Phase 1 is causing the problemPre-shared key on local gateway encrypted by the hash algorithm doesn't match with the hash on the peer gateway generated by encrypting its pre-shared key created in Packet 1 and Packet 2
Answers
Suggested answer: B

Your fwm constantly crashes and is restarted by the watchdog. You can't find any coredumps related to this process, so you need to check If coredumps are enabled at all How can you achieve that?

A.
in dish run show core-dump status
A.
in dish run show core-dump status
Answers
B.
in expert mode run show core-dump status
B.
in expert mode run show core-dump status
Answers
C.
in dish run set core-dump status
C.
in dish run set core-dump status
Answers
D.
in dish run show coredumb status
D.
in dish run show coredumb status
Answers
Suggested answer: A

Explanation:

https://support.checkpoint.com/results/sk/sk92764

What is the function of the Core Dump Manager utility?

A.
To generate a new core dump for analysis
A.
To generate a new core dump for analysis
Answers
B.
To limit the number of core dump files per process as well as the total amount of disk space used by core files
B.
To limit the number of core dump files per process as well as the total amount of disk space used by core files
Answers
C.
To determine which process is slowing down the system
C.
To determine which process is slowing down the system
Answers
D.
To send crash information to an external analyzer
D.
To send crash information to an external analyzer
Answers
Suggested answer: B

John works for ABC Corporation. They have enabled CoreXL on their firewall John would like to identify the cores on which the SND runs and the cores on which the firewall instance is running.

Which command should John run to view the CPU role allocation?

A.
fw ctl affinity -v
A.
fw ctl affinity -v
Answers
B.
fwaccel stat -I
B.
fwaccel stat -I
Answers
C.
fw ctl affinity -I
C.
fw ctl affinity -I
Answers
D.
fw ctl cores
D.
fw ctl cores
Answers
Suggested answer: C
Total 114 questions
Go to page: of 12