ExamGecko
Home / Checkpoint / 156-587 / List of questions
Ask Question

Checkpoint 156-587 Practice Test - Questions Answers, Page 2

Add to Whishlist

List of questions

Question 11

Report Export Collapse

What is the function of the Core Dump Manager utility?

To determine which process is slowing down the system

To determine which process is slowing down the system

To send crash information to an external analyzer

To send crash information to an external analyzer

To limit the number of core dump files per process as well as the total amount of disk space used by core files

To limit the number of core dump files per process as well as the total amount of disk space used by core files

To generate a new core dump for analysis

To generate a new core dump for analysis

Suggested answer: C
Explanation:

The Core Dump Manager (CDM) is a utility that helps manage core dump files on Check Point systems. Its main functions include:

Limiting file size and number: CDM can be configured to limit the size of individual core dump files and the total amount of disk space used for core dumps. This prevents core dumps from filling up valuable disk space.

Compression: CDM can compress core dump files to reduce their storage size. This is particularly helpful when dealing with large core dumps.

Process filtering: CDM allows you to specify which processes should be allowed to generate core dumps. This can help prevent unnecessary core dumps from being created.

Remote collection: CDM can be configured to send core dump files to a remote server for analysis. This is useful in environments where direct access to the system generating the core dump is limited.

By using CDM, you can effectively manage core dump files and ensure that they are not overwhelming your system's resources.

asked 13/02/2025
Archana Pingily
46 questions

Question 12

Report Export Collapse

What is the proper command for allowing the system to create core files?

service core-dump start

service core-dump start

SFWDIR/scripts/core-dump-enable.sh

SFWDIR/scripts/core-dump-enable.sh

set core-dump enable >save config

set core-dump enable >save config

# set core-dump enable # save config

# set core-dump enable # save config

Suggested answer: C
asked 13/02/2025
Thanh Phan
46 questions

Question 13

Report Export Collapse

When a user space process or program suddenly crashes, what type of file is created for analysis

core dump

core dump

kernel_memory_dump dbg

kernel_memory_dump dbg

core analyzer

core analyzer

coredebug

coredebug

Suggested answer: A
Explanation:

When a user space process crashes unexpectedly, the operating system often creates a core dump file. This file is a snapshot of the process's memory at the time of the crash, including information such as:

Program counter: This indicates where the program was executing when it crashed.

Stack pointer: This shows the function call stack, which can help trace the sequence of events leading to the crash.

Memory contents: This includes the values of variables and data structures used by the process.

Register values: This shows the state of the processor registers at the time of the crash.

Core dump files can be analyzed using debuggers like GDB to understand the cause of the crash.

Why other options are incorrect:

B . kernel_memory_dump dbg: This refers to a kernel memory dump, which is generated when the operating system kernel itself crashes.

C . core analyzer: This is a tool used to analyze core dump files, not the file itself.

D . coredebug: This is not a standard term for any type of crash dump file.

Check Point Troubleshooting

Reference:

Check Point's documentation mentions core dumps in the context of troubleshooting various processes, such as fwd (firewall) and cpd (Check Point daemon). You can find information on enabling core dumps and analyzing them in the Check Point administration guides and knowledge base articles.

asked 13/02/2025
Joice Lira
35 questions

Question 14

Report Export Collapse

You receive reports from multiple users that they cannot browse Upon further discovery you identify that Identity Awareness cannot identify the users properly and apply the configuredAccess Roles

What commands you can use to troubleshoot all identity collectors and identity providers from the command line?

on the gateway: pdp debug set IDC all IDP all

on the gateway: pdp debug set IDC all IDP all

on the gateway: pdp debug set AD all and IDC all

on the gateway: pdp debug set AD all and IDC all

on the management: pdp debug on IDC all

on the management: pdp debug on IDC all

on the management: pdp debug set all

on the management: pdp debug set all

Suggested answer: A
Explanation:

To troubleshoot Identity Awareness issues related to user identification and Access Role application, you need to enable debugging for both Identity Collectors (IDC) and Identity Providers (IDP). The command pdp debug set IDC all IDP all on the gateway achieves this.

Here's why this is the correct answer and why the others are not:

A . on the gateway: pdp debug set IDC all IDP all: This correctly enables debugging for all Identity Collectors and Identity Providers, allowing you to see detailed logs and messages related to user identification and Access Role assignment. This helps pinpoint issues with user mapping, authentication, or authorization.

B . on the gateway: pdp debug set AD all and IDC all: This command only enables debugging for Active Directory (AD) as an Identity Provider and all Identity Collectors. It might miss issues related to other Identity Providers if they are in use.

C . on the management: pdp debug on IDC all: This command has two issues. First, it should be executed on the gateway, not the management server, as the gateway is responsible for user identification and policy enforcement. Second, it only enables debugging for Identity Collectors, not Identity Providers.

D . on the management: pdp debug set all: While this command might seem to enable debugging for everything, it's not specific enough for Identity Awareness troubleshooting. It might generate excessive logs unrelated to the issue and make it harder to find the relevant information.

Check Point Troubleshooting

Reference:

Check Point Identity Awareness Administration Guide: This guide provides detailed information about Identity Awareness components, configuration, and troubleshooting.

Check Point sk113963: This article explains how to troubleshoot Identity Awareness issues using debug commands and logs.

Check Point R81.20 Security Administration Guide: This guide covers general troubleshooting and debugging techniques, including the use of pdp debug commands.

asked 13/02/2025
Marcelo Tamaki
43 questions

Question 15

Report Export Collapse

When a User process or program suddenly crashes, a core dump is often used to examine the problem Which command is used to enable the core-dumping via GAIA clish?

Become a Premium Member for full access
  Unlock Premium Member

Question 16

Report Export Collapse

What is NOT a benefit of the 'fw ctl zdebug' command?

Become a Premium Member for full access
  Unlock Premium Member

Question 17

Report Export Collapse

When debugging is enabled on firewall kernel module using the fw ctl debug' command with required options, many debug messages are provided by the kernel that help the administrator to identify Issues. Which of the following is true about these debug messages generated by the kernel module?

Become a Premium Member for full access
  Unlock Premium Member

Question 18

Report Export Collapse

During firewall kernel debug with fw ctl zdebug you received less information that expected. You noticed that a lot of messages were lost since the time the debug was started. What should you do to resolve this issue?

Become a Premium Member for full access
  Unlock Premium Member

Question 19

Report Export Collapse

You need to run a kernel debug over a longer period of time as the problem occurs only once or twice a week. Therefore you need to add a timestamp to the kernel debug and write the output to a file but you cant afford to fill up all the remaining disk space and you only have 10 GB free for saving the debugs What is the correct syntax for this?

Become a Premium Member for full access
  Unlock Premium Member

Question 20

Report Export Collapse

What command is usually used for general firewall kernel debugging and what is the size of the buffer that is automatically enabled when using the command?

Become a Premium Member for full access
  Unlock Premium Member
Total 78 questions
Go to page: of 8
Search

Related questions