ExamGecko
Home Home / Checkpoint / 156-585

Checkpoint 156-585 Practice Test - Questions Answers, Page 8

Question list
Search
Search

List of questions

Search

Related questions











Some users from your organization have been reporting some connection problems with CIFS since this morning You suspect an IPS issue after an automatic IPS update last night. So you want to perform a packet capture on uppercase I only directly after the IPS chain module (position 4 in the chain) to check If the packets pass the IPS. What command do you need to run?

A.
fw monitor -ml -pi 5 -e <filterexperession>
A.
fw monitor -ml -pi 5 -e <filterexperession>
Answers
B.
fw monitor -pi 5 -e <filterexptession>
B.
fw monitor -pi 5 -e <filterexptession>
Answers
C.
tcpdump -eni any <filterexpression>
C.
tcpdump -eni any <filterexpression>
Answers
D.
fw monitor -pi asm <filtefexpfession>
D.
fw monitor -pi asm <filtefexpfession>
Answers
Suggested answer: C

Which file is commonly associated with troubleshooting crashes on a system such as the Security Gateway?

A.
core dump
A.
core dump
Answers
B.
CPMIL dump
B.
CPMIL dump
Answers
C.
fw monitor
C.
fw monitor
Answers
D.
tcpdump
D.
tcpdump
Answers
Suggested answer: A

The two procedures available for debugging in the firewall kernel are i fw ctl zdebug ii fw ctl debug/kdebug Choose the correct statement explaining the differences in the two

A.
(i) Is used for general debugging, has a small buffer and is a quick way to set kernel debug flags to get an output via command line whereas (11) is useful when there is a need for detailed debugging and requires additional steps to set the buffer and get an output via command line
A.
(i) Is used for general debugging, has a small buffer and is a quick way to set kernel debug flags to get an output via command line whereas (11) is useful when there is a need for detailed debugging and requires additional steps to set the buffer and get an output via command line
Answers
B.
(i) is used to debug the access control policy only, however (n) can be used to debug a unified policy
B.
(i) is used to debug the access control policy only, however (n) can be used to debug a unified policy
Answers
C.
(i) is used to debug only issues related to dropping of traffic, however (n) can be used for any firewall issue including NATing, clustering etc.
C.
(i) is used to debug only issues related to dropping of traffic, however (n) can be used for any firewall issue including NATing, clustering etc.
Answers
D.
(i) is used on a Security Gateway, whereas (11) is used on a Security Management Server
D.
(i) is used on a Security Gateway, whereas (11) is used on a Security Management Server
Answers
Suggested answer: C

What is the name of the VPN kernel process?

A.
VPNK
A.
VPNK
Answers
B.
VPND
B.
VPND
Answers
C.
CVPND
C.
CVPND
Answers
D.
FWK
D.
FWK
Answers
Suggested answer: A

You are running R80.XX on an open server and you see a high CPU utilization on your 12 CPU cores You now want to enable Hyperthreading to get more cores to gain some performance. What is the correct way to achieve this?

A.
Hyperthreading is not supported on open servers, on on Check Point Appliances
A.
Hyperthreading is not supported on open servers, on on Check Point Appliances
Answers
B.
just turn on HAT in the bios of the server and boot it
B.
just turn on HAT in the bios of the server and boot it
Answers
C.
just turn on HAT in the bios of the server and after it has booted enable it in cpconfig
C.
just turn on HAT in the bios of the server and after it has booted enable it in cpconfig
Answers
D.
in dish run set HAT on
D.
in dish run set HAT on
Answers
Suggested answer: A

What are the maximum kernel debug buffer sizes, depending on the version

A.
8MB or 32MB
A.
8MB or 32MB
Answers
B.
8GB or 64GB
B.
8GB or 64GB
Answers
C.
4MB or 8MB
C.
4MB or 8MB
Answers
D.
32MB or 64MB
D.
32MB or 64MB
Answers
Suggested answer: A

Which daemon governs the Mobile Access VPN blade and works with VPND to create Mobile Access VPN connections? It also handles interactions between HTTPS and the Multi-Portal Daemon.

A.
Connectra VPN Daemon - cvpnd
A.
Connectra VPN Daemon - cvpnd
Answers
B.
Mobile Access Daemon - MAD
B.
Mobile Access Daemon - MAD
Answers
C.
mvpnd
C.
mvpnd
Answers
D.
SSL VPN Daemon - sslvpnd
D.
SSL VPN Daemon - sslvpnd
Answers
Suggested answer: A

You are trying to establish a VPN tunnel between two Security Gateways but fail. What initial steps will you make to troubleshoot the issue

A.
capture traffic on both tunnel members and collect debug of IKE and VPND daemon
A.
capture traffic on both tunnel members and collect debug of IKE and VPND daemon
Answers
B.
capture traffic on both tunnel members and collect kernel debug for fw module with vm, crypt, conn and drop flags, then collect debug of IKE and VPND daemon
B.
capture traffic on both tunnel members and collect kernel debug for fw module with vm, crypt, conn and drop flags, then collect debug of IKE and VPND daemon
Answers
C.
collect debug of IKE and VPND daemon and collect kernel debug for fw module with vm, crypt, conn and drop flags
C.
collect debug of IKE and VPND daemon and collect kernel debug for fw module with vm, crypt, conn and drop flags
Answers
D.
capture traffic on both tunnel members and collect kernel debug for fw module with vm, crypt, conn and drop flags
D.
capture traffic on both tunnel members and collect kernel debug for fw module with vm, crypt, conn and drop flags
Answers
Suggested answer: A

An administrator receives reports about issues with log indexing and text searching regarding an existing Management Server. In trying to find a solution she wants to check if the process responsible for this feature is running correctly. What is true about the related process?

A.
fwm manages this database after initialization of the ICA
A.
fwm manages this database after initialization of the ICA
Answers
B.
cpd needs to be restarted manual to show in the list
B.
cpd needs to be restarted manual to show in the list
Answers
C.
fwssd crashes can affect therefore not show in the list
C.
fwssd crashes can affect therefore not show in the list
Answers
D.
solr is a child process of cpm
D.
solr is a child process of cpm
Answers
Suggested answer: D

When debugging is enabled on firewall kernel module using the ‘fw ctl debug’ command with required options, many debug messages are provided by the kernel that help the administrator to identify issues. Which of the following is true about these debug messages generated by the kernel module?

A.
Messages are written to a buffer and collected using ‘fw ctl kdebug’
A.
Messages are written to a buffer and collected using ‘fw ctl kdebug’
Answers
B.
Messages are written to console and also /var/log/messages file
B.
Messages are written to console and also /var/log/messages file
Answers
C.
Messages are written to /etc/dmesg file
C.
Messages are written to /etc/dmesg file
Answers
D.
Messages are written to $FWDIR/log/fw.elg
D.
Messages are written to $FWDIR/log/fw.elg
Answers
Suggested answer: B
Total 114 questions
Go to page: of 12