ExamGecko
Home / Checkpoint / 156-585 / List of questions
Ask Question

Checkpoint 156-585 Practice Test - Questions Answers, Page 9

Add to Whishlist

List of questions

Question 81

Report Export Collapse

How can you increase the ring buffer size to 1024 descriptors?

Become a Premium Member for full access
  Unlock Premium Member

Question 82

Report Export Collapse

What are four main database domains?

Become a Premium Member for full access
  Unlock Premium Member

Question 83

Report Export Collapse

Which command can be run in Expert mode to verify the core dump settings?

Become a Premium Member for full access
  Unlock Premium Member

Question 84

Report Export Collapse

What process is responsible for sending and receiving logs in the management server?

Become a Premium Member for full access
  Unlock Premium Member

Question 85

Report Export Collapse

What is the best way to resolve an issue caused by a frozen process?

Become a Premium Member for full access
  Unlock Premium Member

Question 86

Report Export Collapse

What is the difference in debugging a S2S or C2S (using Check Point VPN Client) VPN?

Become a Premium Member for full access
  Unlock Premium Member

Question 87

Report Export Collapse

What process monitors, terminates, and restarts critical Check Point processes as necessary?

Become a Premium Member for full access
  Unlock Premium Member

Question 88

Report Export Collapse

The Check Point Firewall Kernel is the core component of the Gala operating system and an integral part of traffic inspection process. There are two procedures available for debugging the firewall kernel. Which procedure/command is used for detailed troubleshooting and needs more resources?

Become a Premium Member for full access
  Unlock Premium Member

Question 89

Report Export Collapse

Joey is configuring a site-to-site VPN with his business partner. On Joey’s site he has a Check Point R80.10 Gateway and his partner uses Cisco ASA 5540 as a gateway.

Joey’s VPN domain on the Check Point Gateway object is manually configured with a group object that contains two network objects:

VPN_Domain3 = 192.168.14.0/24

VPN_Domain4 = 192.168.15.0/24

Partner’s site ACL as viewed from β€œshow run” access-list JOEY-VPN extended permit ip 172.26.251.0 255.255.255.0 192.168.14.0 255.255.255.0 access-list JOEY-VPN extended permit ip 172.26.251.0 255.255.255.0 192.168.15.0 255.255.255.0 When they try to establish VPN tunnel, it fails. What is the most likely cause of the failure given the information provided?

Become a Premium Member for full access
  Unlock Premium Member

Question 90

Report Export Collapse

Which kernel process is used by Content Awareness to collect the data from contexts?

Become a Premium Member for full access
  Unlock Premium Member
Total 114 questions
Go to page: of 12

Related questions