ExamGecko
Home Home / Checkpoint / 156-585

Checkpoint 156-585 Practice Test - Questions Answers, Page 5

Question list
Search
Search

Related questions











Which of the following is NOT a valid "fwaccel" parameter?

A.
stat
A.
stat
Answers
B.
stats
B.
stats
Answers
C.
templates
C.
templates
Answers
D.
packets
D.
packets
Answers
Suggested answer: D

Explanation:

https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk41397

Which Daemon should be debugged for HTTPS Inspection related issues?

A.
FWD
A.
FWD
Answers
B.
HTTPD
B.
HTTPD
Answers
C.
WSTLSO
C.
WSTLSO
Answers
D.
VPND
D.
VPND
Answers
Suggested answer: C

Which situation triggers an IPS bypass under load on a 24-core Check Point appliance?

A.
any of the CPU cores is above the threshold for more than 10 seconds
A.
any of the CPU cores is above the threshold for more than 10 seconds
Answers
B.
all CPU core most be above the threshold for more than 10 seconds
B.
all CPU core most be above the threshold for more than 10 seconds
Answers
C.
a single CPU core must be above the threshold for more than 10 seconds, but is must be the same core during this time
C.
a single CPU core must be above the threshold for more than 10 seconds, but is must be the same core during this time
Answers
D.
the average cpu utilization over all cores must be above the threshold for 1 second
D.
the average cpu utilization over all cores must be above the threshold for 1 second
Answers
Suggested answer: A

Which of the following inputs is suitable for debugging HTTPS inspection issues?

A.
vpn debug cptls on
A.
vpn debug cptls on
Answers
B.
fw ctl debug –m fw + conn drop cptls
B.
fw ctl debug –m fw + conn drop cptls
Answers
C.
fw diag debug tls enable
C.
fw diag debug tls enable
Answers
D.
fw debug tls on TDERROR_ALL_ALL=5
D.
fw debug tls on TDERROR_ALL_ALL=5
Answers
Suggested answer: B

Explanation:

https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk108202

What is the correct syntax to turn a VPN debug on and create new empty debug files?

A.
vpn debug truncon
A.
vpn debug truncon
Answers
B.
vpndebug trunc on
B.
vpndebug trunc on
Answers
C.
vpn kdebug on
C.
vpn kdebug on
Answers
D.
vpn debug trunkon
D.
vpn debug trunkon
Answers
Suggested answer: A

If IPS protections that prevent SecureXL from accelerating traffic, such as Network Quota, Fingerprint Scrambling. TTL Masking etc, have to be used, what is a recommended practice to enhance the performance of the gateway?

A.
Use the IPS exception mechanism
A.
Use the IPS exception mechanism
Answers
B.
Disable all such protections
B.
Disable all such protections
Answers
C.
Disable SecureXL and use CoreXL
C.
Disable SecureXL and use CoreXL
Answers
D.
Upgrade the hardware to include more Cores and Memory
D.
Upgrade the hardware to include more Cores and Memory
Answers
Suggested answer: A

Check Point Access Control Daemons contains several daemons for Software Blades and features Which Daemon is used for Application & Control URL Filtering?

A.
rad
A.
rad
Answers
B.
cprad
B.
cprad
Answers
C.
pepd
C.
pepd
Answers
D.
pdpd
D.
pdpd
Answers
Suggested answer: A

Where will the usermode core files be located?

A.
/var/log/dump/usermode
A.
/var/log/dump/usermode
Answers
B.
/var/suroot
B.
/var/suroot
Answers
C.
SFWDlR/var'log/dump/usermode
C.
SFWDlR/var'log/dump/usermode
Answers
D.
SCPDIR/var/log/dump/usermodeAnswer: A
D.
SCPDIR/var/log/dump/usermodeAnswer: A
Answers
Suggested answer: A

Check Point's PostgreSQL is partitioned into several relational database domains. Which domain contains network objects and security policies?

A.
User Domain
A.
User Domain
Answers
B.
System Domain
B.
System Domain
Answers
C.
Global Domain
C.
Global Domain
Answers
D.
Log Domain
D.
Log Domain
Answers
Suggested answer: C

What are the four ways to insert an FW Monitor into the firewall kernel chain?

A.
Relative position using location, relative position using alias, absolute position, all positions
A.
Relative position using location, relative position using alias, absolute position, all positions
Answers
B.
Absolute position using location, absolute position using alias, relative position, all positions
B.
Absolute position using location, absolute position using alias, relative position, all positions
Answers
C.
Absolute position using location, relative position using alias, general position, all positions
C.
Absolute position using location, relative position using alias, general position, all positions
Answers
D.
Relative position using geolocation, relative position using inertial navigation, absolute position, all positions
D.
Relative position using geolocation, relative position using inertial navigation, absolute position, all positions
Answers
Suggested answer: D
Total 114 questions
Go to page: of 12