ExamGecko
Home Home / Checkpoint / 156-586

Checkpoint 156-586 Practice Test - Questions Answers, Page 2

Question list
Search
Search

In Mobile Access VPN, clientless access is done using a web browser. The primary communication path for these browser based connections is a process that allows numerous processes to utilize port 443 and redirects traffic to a designated port of the respective process. Which daemon handles this?

A.
Mobile Access Daemon (MAD)
A.
Mobile Access Daemon (MAD)
Answers
B.
Connectra VPN Daemon (cvpnd)
B.
Connectra VPN Daemon (cvpnd)
Answers
C.
HTTPS Inspection Daemon (HID)
C.
HTTPS Inspection Daemon (HID)
Answers
D.
Multi-portal Daemon
D.
Multi-portal Daemon
Most voted
Answers (1)
Most voted
Suggested answer: D

SmartEvent utilizes the Log Server, Correlation Unit and SmartEvent Server to aggregate logs and identify security events. The three main processes that govern these SmartEvent components are:

A.
cpcu, cplog, cpse
A.
cpcu, cplog, cpse
Answers
B.
eventiasv, eventiarp,eventiacu
B.
eventiasv, eventiarp,eventiacu
Answers
C.
cpsemd, cpsead, and DBSync
C.
cpsemd, cpsead, and DBSync
Answers
D.
fwd, secu, sesrv
D.
fwd, secu, sesrv
Answers
Suggested answer: C

Which of these packet processing components stores Rule Base matching state-related information?

A.
Observers
A.
Observers
Answers
B.
Classifiers
B.
Classifiers
Answers
C.
Manager
C.
Manager
Answers
D.
Handlers
D.
Handlers
Answers
Suggested answer: D

That is the proper command for allowing the system to create core files?

A.
$FWDIR/scripts/core-dump-enable.sh
A.
$FWDIR/scripts/core-dump-enable.sh
Answers
B.
# set core-dump enable # save config
B.
# set core-dump enable # save config
Answers
C.
> set core-dump enable > save config
C.
> set core-dump enable > save config
Answers
D.
service core-dump start
D.
service core-dump start
Answers
Suggested answer: C

What is correct about the Resource Advisor (RAD) service on the Security Gateways?

A.
RAD functions completely in user space. The Pattern Matter (PM) module of the CMI looks up for URLs in the cache and if not found, contact the RAD process in user space to do online categorization
A.
RAD functions completely in user space. The Pattern Matter (PM) module of the CMI looks up for URLs in the cache and if not found, contact the RAD process in user space to do online categorization
Answers
B.
RAD is completely loaded as a kernel module that looks up URL in cache and if not found connects online for categorization. There is no user space involvement in this process
B.
RAD is completely loaded as a kernel module that looks up URL in cache and if not found connects online for categorization. There is no user space involvement in this process
Answers
C.
RAD is not a separate module, it is an integrated function of the W kernel module and does all operations in the kernel space
C.
RAD is not a separate module, it is an integrated function of the W kernel module and does all operations in the kernel space
Answers
D.
RAD has a kernel module that looks up the kernel cache, notifies client about hits and misses and forwards a-sync requests to RAD user space module which is responsible for online categorization
D.
RAD has a kernel module that looks up the kernel cache, notifies client about hits and misses and forwards a-sync requests to RAD user space module which is responsible for online categorization
Answers
Suggested answer: D

Which of the following is contained in the System Domain of the Postgres database?

A.
Trusted GUI clients
A.
Trusted GUI clients
Answers
B.
Configuration data of log servers
B.
Configuration data of log servers
Answers
C.
Saved queries for applications
C.
Saved queries for applications
Answers
D.
User modified configurations such as network objects
D.
User modified configurations such as network objects
Answers
Suggested answer: A

Where will the usermode core files located?

A.
/var/log/dump/usermode
A.
/var/log/dump/usermode
Answers
B.
$CPDIR/var/log/dump/usermode
B.
$CPDIR/var/log/dump/usermode
Answers
C.
$FWDIR/var/log/dump/usermode
C.
$FWDIR/var/log/dump/usermode
Answers
D.
/var/suroot
D.
/var/suroot
Answers
Suggested answer: A

The Check Point Watch Daemon (CPWD) monitors critical Check Point processes, terminating them or restarting them as needed to maintain consistent, stable operating conditions. When checking the status/output of CPWD you are able to see some columns like APP, PID, STAT, START, etc. What is the column 'STAT' used for?

A.
Shows the Watch Dog name of the monitored process
A.
Shows the Watch Dog name of the monitored process
Answers
B.
Shows the status of the monitored process
B.
Shows the status of the monitored process
Answers
C.
Shows how many times the Watch Dog started the monitored process
C.
Shows how many times the Watch Dog started the monitored process
Answers
D.
Shows what monitoring method Watch Dog is using to track the process
D.
Shows what monitoring method Watch Dog is using to track the process
Answers
Suggested answer: B

What does CMI stand for in relation to the Access Control Policy?

A.
Content Management Interface
A.
Content Management Interface
Answers
B.
Content Matching Infrastructure
B.
Content Matching Infrastructure
Answers
C.
Context Manipulation Interface
C.
Context Manipulation Interface
Answers
D.
Context Management Infrastructure
D.
Context Management Infrastructure
Answers
Suggested answer: D

During firewall kernel debug with fw ctl zdebug you received less information that expected. You noticed that a lot of messages were lost since the time the debug was started. What should you do to resolve this issue?

A.
Increase debug buffer; Use fw ctl debug -buf 32768
A.
Increase debug buffer; Use fw ctl debug -buf 32768
Answers
B.
Redirect debug output to file; Use fw ctl debug -o ./debug.elg
B.
Redirect debug output to file; Use fw ctl debug -o ./debug.elg
Answers
C.
Redirect debug output to file; Use fw ctl zdebug -o ./debug.elg
C.
Redirect debug output to file; Use fw ctl zdebug -o ./debug.elg
Answers
D.
Increase debug buffer; Use fw ctl zdebug -buf 32768
D.
Increase debug buffer; Use fw ctl zdebug -buf 32768
Answers
Suggested answer: A
Total 75 questions
Go to page: of 8