ExamGecko
Home Home / Checkpoint / 156-586

Checkpoint 156-586 Practice Test - Questions Answers, Page 6

Question list
Search
Search

Captive Portal, PDP and PEP run in what space?

A.
Kernel
A.
Kernel
Answers
B.
User
B.
User
Answers
C.
CPM
C.
CPM
Answers
D.
FWD
D.
FWD
Answers
Suggested answer: B

Which Daemon should be debugged for HTTPS Inspection related issues?

A.
FWD
A.
FWD
Answers
B.
WSTLSD
B.
WSTLSD
Answers
C.
HTTPD
C.
HTTPD
Answers
D.
VPND
D.
VPND
Answers
Suggested answer: B

The two procedures available for debugging in the firewall kernel are

i. fw ctl zdebug

ii. fw ctl debug/kdebug

Choose the correct statement explaining the differences in the two

A.
(i) is used to debug only issues related to dropping of traffic, however (ii) can be used for any firewall issue including NATing, clustering etc.
A.
(i) is used to debug only issues related to dropping of traffic, however (ii) can be used for any firewall issue including NATing, clustering etc.
Answers
B.
(i) is used to debug the access control policy only, however (ii) can be used to debug a unified policy
B.
(i) is used to debug the access control policy only, however (ii) can be used to debug a unified policy
Answers
C.
(i) is used on a Security Gateway, whereas (ii) is used on a Security Management Server
C.
(i) is used on a Security Gateway, whereas (ii) is used on a Security Management Server
Answers
D.
(i) is used for general debugging, has a small buffer and is a quick way to set kernel debug flags to getan output via command line whereas (ii) is useful when there is a need for detailed debugging and requires additional steps to set the buffer and get an output via command line
D.
(i) is used for general debugging, has a small buffer and is a quick way to set kernel debug flags to getan output via command line whereas (ii) is useful when there is a need for detailed debugging and requires additional steps to set the buffer and get an output via command line
Answers
Suggested answer: D

In Check Point's Packet Processing Infrastructure, what is the role of Observers?

A.
They store Rule Base matching state related information
A.
They store Rule Base matching state related information
Answers
B.
Observers monitor the state of Check Point gateways and report it to the security manager
B.
Observers monitor the state of Check Point gateways and report it to the security manager
Answers
C.
Observers attach object IDs to traffic
C.
Observers attach object IDs to traffic
Answers
D.
Observers decide whether or not to publish a CLOB to the Security Policy
D.
Observers decide whether or not to publish a CLOB to the Security Policy
Answers
Suggested answer: C

You need to run a kernel debug over a longer period of time as the problem occurs only once or twice a week. Therefore, you need to add a timestamp to the kernel debug and write the output to a file but you can't afford to fill up all the remaining disk space and you only have 10 GB free for saving the debugs. What is the correct syntax for this?

A.
fw ctl debug -T -f -m 10 -s 1000000 -o debugfilename
A.
fw ctl debug -T -f -m 10 -s 1000000 -o debugfilename
Answers
B.
fw ctl kdebug -T -f -m 10 -s 1000000 > debugfilename
B.
fw ctl kdebug -T -f -m 10 -s 1000000 > debugfilename
Answers
C.
fw ctl kdebug -T -f -m 10 -s 1000000 -o debugfilename
C.
fw ctl kdebug -T -f -m 10 -s 1000000 -o debugfilename
Answers
D.
fw ctl kdebug-T -m 10 -s 1000000 -o debugfilename
D.
fw ctl kdebug-T -m 10 -s 1000000 -o debugfilename
Answers
Suggested answer: C

How can you start debug of the Unified Policy with all possible flags turned on?

A.
fw ctl debug -m UP all
A.
fw ctl debug -m UP all
Answers
B.
fw ctl debug -m UP
B.
fw ctl debug -m UP
Answers
C.
fw ctl debug -m fw + UP
C.
fw ctl debug -m fw + UP
Answers
D.
fw ctl debuq -m UnifiedPolicv all
D.
fw ctl debuq -m UnifiedPolicv all
Answers
Suggested answer: A

What is the kernel process for Content Awareness that collects the data from the contexts received from the CMI and decides if the file is matched by a data type?

A.
cntawmod
A.
cntawmod
Answers
B.
dlpda
B.
dlpda
Most voted
Answers (1)
Most voted
C.
dlpu
C.
dlpu
Answers
D.
cntmgr
D.
cntmgr
Answers
Suggested answer: A

When dealing with monolithic operating systems such as Gaia, where are system calls initiated from to achieve a required system level function?

A.
Kernel Mode
A.
Kernel Mode
Answers
B.
User Mode
B.
User Mode
Answers
C.
Slow Path
C.
Slow Path
Answers
D.
Medium Path
D.
Medium Path
Answers
Suggested answer: B

What cli command is run on the GW to verify communication to the Identity Collector?

A.
fwd connected
A.
fwd connected
Answers
B.
pdp connections idc
B.
pdp connections idc
Answers
C.
pep connections idc
C.
pep connections idc
Answers
D.
show idc connections
D.
show idc connections
Answers
Suggested answer: B

You receive reports that Users cannot browse internet sites. You are using identity awareness with AD Query and Identity Collector in addition you have the Browser Based Authentication Enabled. What command can be used to debug the problem?

A.
on the gateway: ad debug on
A.
on the gateway: ad debug on
Answers
B.
on the gateway: ad query debug on
B.
on the gateway: ad query debug on
Answers
C.
on the management: ad query debug extended
C.
on the management: ad query debug extended
Answers
D.
on the gateway: pdp debug nac extended
D.
on the gateway: pdp debug nac extended
Answers
Suggested answer: D
Total 75 questions
Go to page: of 8