ExamGecko
Home Home / Checkpoint / 156-585

Checkpoint 156-585 Practice Test - Questions Answers, Page 6

Question list
Search
Search

Related questions











What file extension should be used with fw monitor to allow the output file to be imported and read in Wireshark?

A.
.cap
A.
.cap
Answers
B.
.exe
B.
.exe
Answers
C.
.tgz
C.
.tgz
Answers
D.
.pcap
D.
.pcap
Answers
Suggested answer: A

Which one of the following is NOT considered a Solr core partition:

A.
CPM_0_Revisions
A.
CPM_0_Revisions
Answers
B.
CPM_Global_A
B.
CPM_Global_A
Answers
C.
CPM_Gtobal_R
C.
CPM_Gtobal_R
Answers
D.
CPM_0_Disabled
D.
CPM_0_Disabled
Answers
Suggested answer: D

Where do Protocol parsers register themselves for IPS?

A.
Passive Streaming Library
A.
Passive Streaming Library
Answers
B.
Other handlers register to Protocol parser
B.
Other handlers register to Protocol parser
Answers
C.
Protections database
C.
Protections database
Answers
D.
Context Management Infrastructure
D.
Context Management Infrastructure
Answers
Suggested answer: A

Which of the following is NOT a vpn debug command used for troubleshooting?

A.
fw ctl debug -m fw + conn drop vm crypt
A.
fw ctl debug -m fw + conn drop vm crypt
Answers
B.
vpn debug trunc
B.
vpn debug trunc
Answers
C.
pclient getdata sslvpn
C.
pclient getdata sslvpn
Answers
D.
vpn debug on TDERROR_ALL_ALL=5
D.
vpn debug on TDERROR_ALL_ALL=5
Answers
Suggested answer: C

Which command is most useful for debugging the fwaccel module?

A.
fw zdebug
A.
fw zdebug
Answers
B.
securexl debug
B.
securexl debug
Answers
C.
fwaccel dbg
C.
fwaccel dbg
Answers
D.
fw debug
D.
fw debug
Answers
Suggested answer: C

The management configuration stored in the Postgres database is partitioned into several relational database Domains, like - System, User, Global and Log Domains. The User Domain stores the network objects and security policies. Which of the following is stored in the Log Domain?

A.
Configuration data of Log Servers and saved queries for applications
A.
Configuration data of Log Servers and saved queries for applications
Answers
B.
Active Logs received from Security Gateways and Management Servers
B.
Active Logs received from Security Gateways and Management Servers
Answers
C.
Active and past logs received from Gateways and Servers
C.
Active and past logs received from Gateways and Servers
Answers
D.
Log Domain is not stored in Postgres database, it is part of Solr indexer only
D.
Log Domain is not stored in Postgres database, it is part of Solr indexer only
Answers
Suggested answer: D

After kernel debug with "fw ctl debug" you received a huge amount of information It was saved in a very large file that is difficult to open and analyze with standard text editors Suggest a solution to solve this issue.

A.
Use "fw ctl zdebug' because of 1024KB buffer size
A.
Use "fw ctl zdebug' because of 1024KB buffer size
Answers
B.
Divide debug information into smaller files Use "fw ctl kdebug -f -o "filename" -m 25 - s "1024"
B.
Divide debug information into smaller files Use "fw ctl kdebug -f -o "filename" -m 25 - s "1024"
Answers
C.
Reduce debug buffer to 1024KB and run debug for several times
C.
Reduce debug buffer to 1024KB and run debug for several times
Answers
D.
Use Check Point InfoView utility to analyze debug output
D.
Use Check Point InfoView utility to analyze debug output
Answers
Suggested answer: C

How many captures does the command "fw monitor -p all" take?

A.
All 15 of the inbound and outbound modules
A.
All 15 of the inbound and outbound modules
Answers
B.
All 4 points of the fw VM modules
B.
All 4 points of the fw VM modules
Answers
C.
1 from every inbound and outbound module of the chain
C.
1 from every inbound and outbound module of the chain
Answers
D.
The -p option takes the same number of captures, but gathers all of the data packet
D.
The -p option takes the same number of captures, but gathers all of the data packet
Answers
Suggested answer: C

What is NOT a benefit of the fw ctl zdebug command?

A.
Cannot be used to debug additional modules
A.
Cannot be used to debug additional modules
Answers
B.
Collect debug messages from the kernel
B.
Collect debug messages from the kernel
Answers
C.
Clean the buffer
C.
Clean the buffer
Answers
D.
Automatically allocate a 1MB buffer
D.
Automatically allocate a 1MB buffer
Answers
Suggested answer: A

URL Filtering is an essential part of Web Security in the Gateway. For the Security Gateway to perform a URL lookup when a client makes a URL request, where is the sync-request forwarded from if a sync-request is required''

A.
RAD Kernel Space
A.
RAD Kernel Space
Answers
B.
URLF Kernel Client
B.
URLF Kernel Client
Answers
C.
URLF Online Service
C.
URLF Online Service
Answers
D.
RAD User Space
D.
RAD User Space
Answers
Suggested answer: B
Total 114 questions
Go to page: of 12