Checkpoint 156-586 Practice Test - Questions Answers, Page 3
List of questions
Question 21

Check Point Access Control Daemons contains several daemons for Software Blades and features. Which Daemon is used for Application & Control URL Filtering?
Question 22

What is the name of the VPN kernel process?
Question 23

What version of Check Point can Security Gateways begin dynamically distributing Logs between log servers?
Question 24

In some scenarios it is very helpful to use advanced Linux commands for troubleshooting purposes. Which command displays information about resource utilization for running processes and shows additional information for core utilization and memory?
Question 25

What is the port for the Log Collection on Security Management Server?
Question 26

Troubleshooting issues with Mobile Access requires the following:
Question 27

What command is used to find out which port Multi-Portal has assigned to the Mobile Access Portal?
Question 28

What is the correct syntax to set all debug flags for Unified Policy related issues?
Question 29

You receive reports from multiple users that they cannot browse. Upon further discovery you identify that Identity Awareness cannot identify the users properly and apply the configured Access Roles. What commands you can use to troubleshoot all identity collectors and identity providers from the command line?
Question 30

What are the main components of Check Point's Security Management architecture?
Question