ExamGecko
Home Home / Checkpoint / 156-586

Checkpoint 156-586 Practice Test - Questions Answers, Page 5

Question list
Search
Search

What is the simplest and most efficient way to check all dropped packets in real time?

A.
tail -f $FWDIR/log/fw.log |grep drop in expert mode
A.
tail -f $FWDIR/log/fw.log |grep drop in expert mode
Answers
B.
cat /dev/fw1/log in expert mode
B.
cat /dev/fw1/log in expert mode
Answers
C.
fw ctl zdebug + drop in expert mode
C.
fw ctl zdebug + drop in expert mode
Answers
D.
Smartlog
D.
Smartlog
Answers
Suggested answer: C

After kernel debug with 'fw ctl debug' you received a huge amount of information. It was saved in a very large file that is difficult to open and analyze with standard text editors. Suggest a solution to solve this issue.

A.
Divide debug information into smaller files. Use 'fw ctl kdebug -f -o 'filename' -m 25 - s '1024'
A.
Divide debug information into smaller files. Use 'fw ctl kdebug -f -o 'filename' -m 25 - s '1024'
Answers
B.
Use 'fw ctl zdebug' because of 1024KB buffer size
B.
Use 'fw ctl zdebug' because of 1024KB buffer size
Answers
C.
Use Check Point InfoView utility to analyze debug output
C.
Use Check Point InfoView utility to analyze debug output
Answers
D.
Reduce debug buffer to 1024KB and run debug for several times
D.
Reduce debug buffer to 1024KB and run debug for several times
Answers
Suggested answer: A

You are seeing output from the previous kernel debug. What command should you use to avoid that?

A.
fw ctl debug = 0
A.
fw ctl debug = 0
Answers
B.
fw ctl clean buffer = 0
B.
fw ctl clean buffer = 0
Answers
C.
fw ctl zdebug disable
C.
fw ctl zdebug disable
Answers
D.
fw ctl debug 0
D.
fw ctl debug 0
Answers
Suggested answer: A

Which of the following would NOT be a flag when debugging a unified policy?

A.
tls
A.
tls
Answers
B.
rulebase
B.
rulebase
Answers
C.
clob
C.
clob
Answers
D.
connection
D.
connection
Answers
Suggested answer: A

Which of the following inputs is suitable for debugging HTTPS inspection issues?

A.
fw debug tls on TDERROR_ALL_ALL=5
A.
fw debug tls on TDERROR_ALL_ALL=5
Answers
B.
fw ctl debug -m fw + conn drop cptls
B.
fw ctl debug -m fw + conn drop cptls
Answers
C.
vpn debug cptls on
C.
vpn debug cptls on
Answers
D.
fw diag debug tls enable
D.
fw diag debug tls enable
Answers
Suggested answer: B

The Check Point Firewall Kernel is the core component of the Gaia operating system and an integral part of the traffic inspection process. There are two procedures available for debugging the firewall kernel. Which procedure/command is used for troubleshooting packet drops and other kernel activities while using minimal resources (1 MB buffer)?

A.
fw debug ctl
A.
fw debug ctl
Answers
B.
fw ctl debug/kdebug
B.
fw ctl debug/kdebug
Answers
C.
fw ctl zdebug
C.
fw ctl zdebug
Answers
D.
fwk ctl debug
D.
fwk ctl debug
Answers
Suggested answer: B

URL Filtering is an essential part of Web Security in the Gateway. For the Security Gateway to perform a URL lookup when a client makes a URL request, where is the sync-request forwarded from if a sync-request is required?

A.
RAD User Space
A.
RAD User Space
Answers
B.
URLF Online Service
B.
URLF Online Service
Answers
C.
URLF Kernel Client
C.
URLF Kernel Client
Answers
D.
RAD Kernel Space
D.
RAD Kernel Space
Answers
Suggested answer: D

Which process is responsible for the generation of certificates?

A.
dbsync
A.
dbsync
Answers
B.
cpm
B.
cpm
Answers
C.
fwm
C.
fwm
Answers
D.
cpca
D.
cpca
Answers
Suggested answer: D

You are using the Identity Collector with Identity Awareness in large environment. Users report that they cannot access resources on Internet. You identify that the traffic is matching the cleanup rule instead of the proper rule with Access Roles using the IDC. How can you check if IDC is working?

A.
pep debug idc on
A.
pep debug idc on
Answers
B.
pdp debug set IDP all all
B.
pdp debug set IDP all all
Answers
C.
ad query | debug on
C.
ad query | debug on
Answers
D.
pdp connections idc
D.
pdp connections idc
Answers
Suggested answer: D

What are the four main database domains?

A.
Local, Global, User, VPN
A.
Local, Global, User, VPN
Answers
B.
System. Global. Log. Event
B.
System. Global. Log. Event
Answers
C.
System, User, Global. Log
C.
System, User, Global. Log
Answers
D.
System, User, Host, Network
D.
System, User, Host, Network
Answers
Suggested answer: C
Total 75 questions
Go to page: of 8