ExamGecko
Home Home / Checkpoint / 156-585

Checkpoint 156-585 Practice Test - Questions Answers, Page 9

Question list
Search
Search

Related questions











How can you increase the ring buffer size to 1024 descriptors?

A.
set interface eth0 rx-ringsize 1024
A.
set interface eth0 rx-ringsize 1024
Answers
B.
fw ctl int rx_ringsize 1024
B.
fw ctl int rx_ringsize 1024
Answers
C.
echo rx_ringsize=1024>>/etc/sysconfig/sysctl.conf
C.
echo rx_ringsize=1024>>/etc/sysconfig/sysctl.conf
Answers
D.
dbedit>modify properties firewall_properties rx_ringsize 1024
D.
dbedit>modify properties firewall_properties rx_ringsize 1024
Answers
Suggested answer: A

What are four main database domains?

A.
System, Global, Log, Event
A.
System, Global, Log, Event
Answers
B.
System, User, Host, Network
B.
System, User, Host, Network
Answers
C.
Local, Global, User, VPN
C.
Local, Global, User, VPN
Answers
D.
System, User, Global, Log
D.
System, User, Global, Log
Answers
Suggested answer: D

Which command can be run in Expert mode to verify the core dump settings?

A.
grep cdm /config/db/coredump
A.
grep cdm /config/db/coredump
Answers
B.
grep cdm /config/db/initial
B.
grep cdm /config/db/initial
Answers
C.
grep $FWDIR/config/db/initial
C.
grep $FWDIR/config/db/initial
Answers
D.
cat /etc/sysconfig/coredump/cdm.conf
D.
cat /etc/sysconfig/coredump/cdm.conf
Answers
Suggested answer: C

What process is responsible for sending and receiving logs in the management server?

A.
FWD
A.
FWD
Answers
B.
CPM
B.
CPM
Answers
C.
FWM
C.
FWM
Answers
D.
CPD
D.
CPD
Answers
Suggested answer: A

What is the best way to resolve an issue caused by a frozen process?

A.
Reboot the machine
A.
Reboot the machine
Answers
B.
Restart the process
B.
Restart the process
Answers
C.
Kill the process
C.
Kill the process
Answers
D.
Power off the machine
D.
Power off the machine
Answers
Suggested answer: B

What is the difference in debugging a S2S or C2S (using Check Point VPN Client) VPN?

A.
there is no difference
A.
there is no difference
Answers
B.
the C2S VPN uses a different VPN daemon and there a second VPN debug
B.
the C2S VPN uses a different VPN daemon and there a second VPN debug
Answers
C.
the C2S VPN can not be debugged as it uses different protocols for the key exchange
C.
the C2S VPN can not be debugged as it uses different protocols for the key exchange
Answers
D.
the C2S client uses Browser based SSL vpn and can’t be debugged
D.
the C2S client uses Browser based SSL vpn and can’t be debugged
Answers
Suggested answer: D

What process monitors, terminates, and restarts critical Check Point processes as necessary?

A.
CPWD
A.
CPWD
Answers
B.
CPM
B.
CPM
Answers
C.
FWD
C.
FWD
Answers
D.
FWM
D.
FWM
Answers
Suggested answer: A

The Check Point Firewall Kernel is the core component of the Gala operating system and an integral part of traffic inspection process. There are two procedures available for debugging the firewall kernel. Which procedure/command is used for detailed troubleshooting and needs more resources?

A.
fw ctl debug/kdebug
A.
fw ctl debug/kdebug
Answers
B.
fw ctl zdebug
B.
fw ctl zdebug
Answers
C.
fw debug/kdebug
C.
fw debug/kdebug
Answers
D.
fw debug/kdebug ctl
D.
fw debug/kdebug ctl
Answers
Suggested answer: B

Joey is configuring a site-to-site VPN with his business partner. On Joey’s site he has a Check Point R80.10 Gateway and his partner uses Cisco ASA 5540 as a gateway.

Joey’s VPN domain on the Check Point Gateway object is manually configured with a group object that contains two network objects:

VPN_Domain3 = 192.168.14.0/24

VPN_Domain4 = 192.168.15.0/24

Partner’s site ACL as viewed from “show run” access-list JOEY-VPN extended permit ip 172.26.251.0 255.255.255.0 192.168.14.0 255.255.255.0 access-list JOEY-VPN extended permit ip 172.26.251.0 255.255.255.0 192.168.15.0 255.255.255.0 When they try to establish VPN tunnel, it fails. What is the most likely cause of the failure given the information provided?

A.
Tunnel falls on partner site. It is likely that the Cisco ASA 5540 will reject the Phase 2 negotiation.Check Point continues to present its own encryption domain as 192.168.14.0/24 and 192.168.15.0/24, but the peer expects the one network 192.168.14.0/23
A.
Tunnel falls on partner site. It is likely that the Cisco ASA 5540 will reject the Phase 2 negotiation.Check Point continues to present its own encryption domain as 192.168.14.0/24 and 192.168.15.0/24, but the peer expects the one network 192.168.14.0/23
Answers
B.
Tunnel fails on partner site. It is likely that the Cisco ASA 5540 will reject the Phase 2 negotiation.Check Point continues to present its own encryption domain as 192.168.14.0/23, but the peer expects the two distinct networks 192.168.14.0/24 and 192.168.15.0/24.
B.
Tunnel fails on partner site. It is likely that the Cisco ASA 5540 will reject the Phase 2 negotiation.Check Point continues to present its own encryption domain as 192.168.14.0/23, but the peer expects the two distinct networks 192.168.14.0/24 and 192.168.15.0/24.
Answers
C.
Tunnel fails on Joey’s site, because he misconfigured IP address of VPN peer.
C.
Tunnel fails on Joey’s site, because he misconfigured IP address of VPN peer.
Answers
D.
Tunnel falls on partner site. It is likely that the Cisco ASA 5540 will reject the Phase 2 negotiation due to the algorithm mismatch.
D.
Tunnel falls on partner site. It is likely that the Cisco ASA 5540 will reject the Phase 2 negotiation due to the algorithm mismatch.
Answers
Suggested answer: B

Which kernel process is used by Content Awareness to collect the data from contexts?

A.
dlpda
A.
dlpda
Answers
B.
PDP
B.
PDP
Answers
C.
cpemd
C.
cpemd
Answers
D.
CMI
D.
CMI
Answers
Suggested answer: D
Total 114 questions
Go to page: of 12