Checkpoint 156-585 Practice Test - Questions Answers, Page 9

List of questions
Question 81

How can you increase the ring buffer size to 1024 descriptors?
Question 82

What are four main database domains?
Question 83

Which command can be run in Expert mode to verify the core dump settings?
Question 84

What process is responsible for sending and receiving logs in the management server?
Question 85

What is the best way to resolve an issue caused by a frozen process?
Question 86

What is the difference in debugging a S2S or C2S (using Check Point VPN Client) VPN?
Question 87

What process monitors, terminates, and restarts critical Check Point processes as necessary?
Question 88

The Check Point Firewall Kernel is the core component of the Gala operating system and an integral part of traffic inspection process. There are two procedures available for debugging the firewall kernel. Which procedure/command is used for detailed troubleshooting and needs more resources?
Question 89

Joey is configuring a site-to-site VPN with his business partner. On Joeyβs site he has a Check Point R80.10 Gateway and his partner uses Cisco ASA 5540 as a gateway.
Joeyβs VPN domain on the Check Point Gateway object is manually configured with a group object that contains two network objects:
VPN_Domain3 = 192.168.14.0/24
VPN_Domain4 = 192.168.15.0/24
Partnerβs site ACL as viewed from βshow runβ access-list JOEY-VPN extended permit ip 172.26.251.0 255.255.255.0 192.168.14.0 255.255.255.0 access-list JOEY-VPN extended permit ip 172.26.251.0 255.255.255.0 192.168.15.0 255.255.255.0 When they try to establish VPN tunnel, it fails. What is the most likely cause of the failure given the information provided?
Question 90

Which kernel process is used by Content Awareness to collect the data from contexts?
Question