ExamGecko
Home / Checkpoint / 156-586 / List of questions
Ask Question

Checkpoint 156-586 Practice Test - Questions Answers, Page 5

List of questions

Question 41

Report Export Collapse

What is the simplest and most efficient way to check all dropped packets in real time?

tail -f $FWDIR/log/fw.log |grep drop in expert mode
tail -f $FWDIR/log/fw.log |grep drop in expert mode
cat /dev/fw1/log in expert mode
cat /dev/fw1/log in expert mode
fw ctl zdebug + drop in expert mode
fw ctl zdebug + drop in expert mode
Smartlog
Smartlog
Suggested answer: C
asked 16/09/2024
Adnan Safdar
39 questions

Question 42

Report Export Collapse

After kernel debug with 'fw ctl debug' you received a huge amount of information. It was saved in a very large file that is difficult to open and analyze with standard text editors. Suggest a solution to solve this issue.

Divide debug information into smaller files. Use 'fw ctl kdebug -f -o 'filename' -m 25 - s '1024'
Divide debug information into smaller files. Use 'fw ctl kdebug -f -o 'filename' -m 25 - s '1024'
Use 'fw ctl zdebug' because of 1024KB buffer size
Use 'fw ctl zdebug' because of 1024KB buffer size
Use Check Point InfoView utility to analyze debug output
Use Check Point InfoView utility to analyze debug output
Reduce debug buffer to 1024KB and run debug for several times
Reduce debug buffer to 1024KB and run debug for several times
Suggested answer: A
asked 16/09/2024
Aleksei Chernikov
56 questions

Question 43

Report Export Collapse

You are seeing output from the previous kernel debug. What command should you use to avoid that?

fw ctl debug = 0
fw ctl debug = 0
fw ctl clean buffer = 0
fw ctl clean buffer = 0
fw ctl zdebug disable
fw ctl zdebug disable
fw ctl debug 0
fw ctl debug 0
Suggested answer: A
asked 16/09/2024
wilson rodriguez
42 questions

Question 44

Report Export Collapse

Which of the following would NOT be a flag when debugging a unified policy?

tls
tls
rulebase
rulebase
clob
clob
connection
connection
Suggested answer: A
asked 16/09/2024
Fatmata Kabba
57 questions

Question 45

Report Export Collapse

Which of the following inputs is suitable for debugging HTTPS inspection issues?

Become a Premium Member for full access
  Unlock Premium Member

Question 46

Report Export Collapse

The Check Point Firewall Kernel is the core component of the Gaia operating system and an integral part of the traffic inspection process. There are two procedures available for debugging the firewall kernel. Which procedure/command is used for troubleshooting packet drops and other kernel activities while using minimal resources (1 MB buffer)?

Become a Premium Member for full access
  Unlock Premium Member

Question 47

Report Export Collapse

URL Filtering is an essential part of Web Security in the Gateway. For the Security Gateway to perform a URL lookup when a client makes a URL request, where is the sync-request forwarded from if a sync-request is required?

Become a Premium Member for full access
  Unlock Premium Member

Question 48

Report Export Collapse

Which process is responsible for the generation of certificates?

Become a Premium Member for full access
  Unlock Premium Member

Question 49

Report Export Collapse

You are using the Identity Collector with Identity Awareness in large environment. Users report that they cannot access resources on Internet. You identify that the traffic is matching the cleanup rule instead of the proper rule with Access Roles using the IDC. How can you check if IDC is working?

Become a Premium Member for full access
  Unlock Premium Member

Question 50

Report Export Collapse

What are the four main database domains?

Become a Premium Member for full access
  Unlock Premium Member
Total 75 questions
Go to page: of 8