ExamGecko
Home Home / Checkpoint / 156-586

Checkpoint 156-586 Practice Test - Questions Answers, Page 4

Question list
Search
Search

What Check Point process controls logging?

A.
FWD
A.
FWD
Answers
B.
CPVVD
B.
CPVVD
Answers
C.
CPM
C.
CPM
Answers
D.
CPD
D.
CPD
Answers
Suggested answer: A

Which of the following daemons is used for Threat Extraction?

A.
tedex
A.
tedex
Answers
B.
extractd
B.
extractd
Answers
C.
tex
C.
tex
Answers
D.
scrubd
D.
scrubd
Answers
Suggested answer: D

When a User process or program suddenly crashes, a core dump is often used to examine the problem. Which command is used to enable the core-dumping via GAIA clish?

A.
set core-dump enable
A.
set core-dump enable
Answers
B.
set core-dump per process
B.
set core-dump per process
Answers
C.
set user-dump enable
C.
set user-dump enable
Answers
D.
set core-dump total
D.
set core-dump total
Answers
Suggested answer: A

The management configuration stored in the Postgres database is partitioned into several relational database domains. What is the purpose of the Global Domain?

A.
Global Domains is used by the IPS software blade to map the IDs to the corresponding countries according to the IpToCountry.csv file.
A.
Global Domains is used by the IPS software blade to map the IDs to the corresponding countries according to the IpToCountry.csv file.
Answers
B.
This domain is used as the global database to back up the objects referencing the corresponding object attributes from the System Domain.
B.
This domain is used as the global database to back up the objects referencing the corresponding object attributes from the System Domain.
Answers
C.
This domain is used as the global database to track the changes made by multiple administrators on the same objects prior to publishing.
C.
This domain is used as the global database to track the changes made by multiple administrators on the same objects prior to publishing.
Answers
D.
This domain is used as the global database for MDSM and contains global objects and policies.
D.
This domain is used as the global database for MDSM and contains global objects and policies.
Answers
Suggested answer: B

What is the most efficient way to read an IKEv2 Debug?

A.
IKE view
A.
IKE view
Most voted
Answers (1)
Most voted
B.
vi on the cl
B.
vi on the cl
Answers
C.
any xml editor
C.
any xml editor
Answers
D.
notepad++
D.
notepad++
Answers
Suggested answer: C

Which of the following is a component of the Context Management Infrastructure used to collect signatures in user space from multiple sources, such as Application Control and IPS, and compiles them together into unified Pattern Matchers?

A.
PSL - Passive Signature Loader
A.
PSL - Passive Signature Loader
Answers
B.
cpas
B.
cpas
Answers
C.
Context Loader
C.
Context Loader
Answers
D.
CMI Loader
D.
CMI Loader
Answers
Suggested answer: C

VPN issues may result from misconfiguration, communication failure, or incompatible default configurations between peers. Which basic command syntax needs to be used for troubleshooting Site-to-Site VPN issues?

A.
vpn truncon debuq
A.
vpn truncon debuq
Answers
B.
cp debug truncon
B.
cp debug truncon
Answers
C.
vpn debug truncon
C.
vpn debug truncon
Answers
D.
fw debug truncon
D.
fw debug truncon
Answers
Suggested answer: C

User defined URLS and HTTPS Inspection User defined URLs on the Security Gateway are stored in which database file?

A.
https_db.bin
A.
https_db.bin
Answers
B.
urlf_https.bin
B.
urlf_https.bin
Answers
C.
https_urlf.bin
C.
https_urlf.bin
Answers
D.
urlf_db.bin
D.
urlf_db.bin
Answers
Suggested answer: D

What process monitors, terminates, and restarts critical Check Point processes as necessary?

A.
CPVVD
A.
CPVVD
Answers
B.
CPM
B.
CPM
Answers
C.
FWM
C.
FWM
Answers
D.
FWD
D.
FWD
Answers
Suggested answer: A

For Identity Awareness, what is the PDP process?

A.
Identity server
A.
Identity server
Answers
B.
Log Sifter
B.
Log Sifter
Answers
C.
Captive Portal Service
C.
Captive Portal Service
Answers
D.
UserAuth Database
D.
UserAuth Database
Answers
Suggested answer: A
Total 75 questions
Go to page: of 8