ExamGecko
Home / Checkpoint / 156-586 / List of questions
Ask Question

Checkpoint 156-586 Practice Test - Questions Answers, Page 4

List of questions

Question 31

Report Export Collapse

What Check Point process controls logging?

FWD
FWD
CPVVD
CPVVD
CPM
CPM
CPD
CPD
Suggested answer: A
asked 16/09/2024
Gabriel Paschoalatto
49 questions

Question 32

Report Export Collapse

Which of the following daemons is used for Threat Extraction?

tedex
tedex
extractd
extractd
tex
tex
scrubd
scrubd
Suggested answer: D
asked 16/09/2024
Corentin ADJOVI
43 questions

Question 33

Report Export Collapse

When a User process or program suddenly crashes, a core dump is often used to examine the problem. Which command is used to enable the core-dumping via GAIA clish?

set core-dump enable
set core-dump enable
set core-dump per process
set core-dump per process
set user-dump enable
set user-dump enable
set core-dump total
set core-dump total
Suggested answer: A
asked 16/09/2024
Javier Portabales
44 questions

Question 34

Report Export Collapse

The management configuration stored in the Postgres database is partitioned into several relational database domains. What is the purpose of the Global Domain?

Global Domains is used by the IPS software blade to map the IDs to the corresponding countries according to the IpToCountry.csv file.
Global Domains is used by the IPS software blade to map the IDs to the corresponding countries according to the IpToCountry.csv file.
This domain is used as the global database to back up the objects referencing the corresponding object attributes from the System Domain.
This domain is used as the global database to back up the objects referencing the corresponding object attributes from the System Domain.
This domain is used as the global database to track the changes made by multiple administrators on the same objects prior to publishing.
This domain is used as the global database to track the changes made by multiple administrators on the same objects prior to publishing.
This domain is used as the global database for MDSM and contains global objects and policies.
This domain is used as the global database for MDSM and contains global objects and policies.
Suggested answer: B
asked 16/09/2024
ALAEDDINE BENMAKHLOUF
54 questions

Question 35

Report Export Collapse

What is the most efficient way to read an IKEv2 Debug?

IKE view
IKE view
Most voted
(1)
Most voted
vi on the cl
vi on the cl
any xml editor
any xml editor
notepad++
notepad++
Suggested answer: C
asked 16/09/2024
brandon landaal
47 questions

Question 36

Report Export Collapse

Which of the following is a component of the Context Management Infrastructure used to collect signatures in user space from multiple sources, such as Application Control and IPS, and compiles them together into unified Pattern Matchers?

PSL - Passive Signature Loader
PSL - Passive Signature Loader
cpas
cpas
Context Loader
Context Loader
CMI Loader
CMI Loader
Suggested answer: C
asked 16/09/2024
JP Pelovello
54 questions

Question 37

Report Export Collapse

VPN issues may result from misconfiguration, communication failure, or incompatible default configurations between peers. Which basic command syntax needs to be used for troubleshooting Site-to-Site VPN issues?

vpn truncon debuq
vpn truncon debuq
cp debug truncon
cp debug truncon
vpn debug truncon
vpn debug truncon
fw debug truncon
fw debug truncon
Suggested answer: C
asked 16/09/2024
Mark Anthony Simon
47 questions

Question 38

Report Export Collapse

User defined URLS and HTTPS Inspection User defined URLs on the Security Gateway are stored in which database file?

https_db.bin
https_db.bin
urlf_https.bin
urlf_https.bin
https_urlf.bin
https_urlf.bin
urlf_db.bin
urlf_db.bin
Suggested answer: D
asked 16/09/2024
Benito Gonzalez
40 questions

Question 39

Report Export Collapse

What process monitors, terminates, and restarts critical Check Point processes as necessary?

CPVVD
CPVVD
CPM
CPM
FWM
FWM
FWD
FWD
Suggested answer: A
asked 16/09/2024
Jialu Wang
38 questions

Question 40

Report Export Collapse

For Identity Awareness, what is the PDP process?

Identity server
Identity server
Log Sifter
Log Sifter
Captive Portal Service
Captive Portal Service
UserAuth Database
UserAuth Database
Suggested answer: A
asked 16/09/2024
wilson rodriguez
42 questions
Total 75 questions
Go to page: of 8