ExamGecko
Home / Checkpoint / 156-587 / List of questions
Ask Question

Checkpoint 156-587 Practice Test - Questions Answers, Page 5

Add to Whishlist

List of questions

Question 41

Report Export Collapse

Which Daemon should be debugged for HTTPS inspection related issues?

Become a Premium Member for full access
  Unlock Premium Member

Question 42

Report Export Collapse

When URL category is not found in the kernel cache, what action will GW do?

Become a Premium Member for full access
  Unlock Premium Member

Question 43

Report Export Collapse

When dealing with monolithic operating systems such as Gaia where are system calls initiated from to achieve a required system level function?

Become a Premium Member for full access
  Unlock Premium Member

Question 44

Report Export Collapse

Which of the following commands can be used to see the list of processes monitored by the Watch Dog process?

Become a Premium Member for full access
  Unlock Premium Member

Question 45

Report Export Collapse

What tool would you run to diagnose logging and indexing?

Become a Premium Member for full access
  Unlock Premium Member

Question 46

Report Export Collapse

You found out that $FWDIR/Iog/fw.log is constantly growing in size at a Security Gateway, what is the reason?

Become a Premium Member for full access
  Unlock Premium Member

Question 47

Report Export Collapse

The Unified Access Control policy eliminates the need to maintain policies for different access control features However, you need to start a general debug of the Unified Policy with all flags turned on Which of the following is the correct syntax?

Become a Premium Member for full access
  Unlock Premium Member

Question 48

Report Export Collapse

What function receives the AD log event information?

Become a Premium Member for full access
  Unlock Premium Member

Question 49

Report Export Collapse

You receive complains that Guest Users cannot login and use the Guest Network which is configured with Access Role of Guest Users. You need to verity the Captive Portal configuration. Where can you find the config file?

Become a Premium Member for full access
  Unlock Premium Member

Question 50

Report Export Collapse

What are the three main component of Identity Awareness?

Become a Premium Member for full access
  Unlock Premium Member
Total 78 questions
Go to page: of 8

Related questions