Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtreat

156-587 Check Point Certified Troubleshooting Expert - R81.20 (CCTE) Questions and Answers

Questions 4

What are the three main component of Identity Awareness?

Options:

A.

Client, SMS and Secure Gateway

B.

Identity Source Identity Server (POP) and Identity Enforcement (PEP)

C.

Identity Awareness Blade on Security Gateway, User Database on Security Management Server and Active Directory

D.

User, Active Directory and Access Role

Buy Now
Questions 5

You modified kernel parameters and after rebooting the gateway, a lot of production traffic gets dropped and the gateway acts strangely What should you do"?

Options:

A.

Run command fw ctl set int fw1_kernel_all_disable=1

B.

Restore fwkem.conf from backup and reboot the gateway

C.

run fw unloadlocal to remove parameters from kernel

D.

Remove all kernel parameters from fwkem.conf and reboot

Buy Now
Questions 6

What is NOT a benefit of the ‘fw ctl zdebug’ command?

Options:

A.

Automatically allocate a 1MB buffer

B.

Collect debug messages from the kernel

C.

Cannot be used to debug additional modules

D.

Clean the buffer

Buy Now
Questions 7

Which kernel process is used by Content Awareness to collect the data from contexts?

Options:

A.

PDP

B.

cpemd

C.

dlpda

D.

CMI

Buy Now
Questions 8

What is the shorthand reference for a classification object?

Options:

A.

classobj

B.

CLOB

C.

COBJ

D.

class.obj

Buy Now
Questions 9

During firewall kernel debug with fw ctl zdebug you received less information that expected. You noticed that a lot of messages were lost since the time the debug was started. What should you do to

resolve this issue?

Options:

A.

Increase debug buffer Use fw ctl debug -buf 32768

B.

Redirect debug output to file; Use fw ctl debug -o /debug.elg

C.

Redirect debug output to file; Use fw ctl zdebug -o /debug.elg

D.

Increase debug buffer; Use fw ctl zdebug -buf 32768

Buy Now
Questions 10

Which of the following inputs is suitable for debugging HTTPS inspection issues?

Options:

A.

fw debug tls on TDERROR_ALL_ALL=5

B.

fw ctl debug -m fw + conn drop cptls

C.

vpn debug cptls on

D.

fw diag debug tls enable

Buy Now
Questions 11

Which of the following is contained in the System Domain of the Postgres database?

Options:

A.

Trusted GUI clients

B.

Configuration data of log servers

C.

Saved queries for applications

D.

User modified configurations such as network objects

Buy Now
Questions 12

What are the main components of Check Point’s Security Management architecture?

Options:

A.

Management server, Log server, Gateway server. Security server

B.

Management server, management database, log server, automation server

C.

Management server. Security Gateway. Multi-Domain Server. SmartEvent Server

D.

Management server. Log Server, LDAP Server, Web Server

Buy Now
Questions 13

When a User Mode process suddenly crashes, it may create a core dump file. Which of the following information is available in the core dump and may be used to identify the root cause of the crash?

i. Program Counter

ii. Stack Pointer

iii. Memory management information

iv. Other Processor and OS flags / information

Options:

A.

iii and iv only

B.

i and ii only

C.

i, ii, iii and iv

D.

Only lii

Buy Now
Questions 14

In Check Point's Packet Processing Infrastructure what is the role of Observers?

Options:

A.

Observers attach object IDs to traffic

B.

They store Rule Base matching state related information

C.

Observers monitor the state of Check Point gateways and report it to the security manager

D.

Observers decide whether or not to publish a CLOB to the Security Policy

Buy Now
Questions 15

For Identity Awareness, what is the PDP process?

Options:

A.

Identity server

B.

Log Sifter

C.

Captive Portal Service

D.

UserAuth Database

Buy Now
Questions 16

What is the proper command for allowing the system to create core files?

Options:

A.

service core-dump start

B.

SFWDIR/scripts/core-dump-enable.sh

C.

set core-dump enable

>save config

D.

# set core-dump enable

# save config

Buy Now
Questions 17

What command would you run to verify the communication between the Security Gateway and the Identity Collector?

Options:

A.

fw ctl debug -m IDAPI

B.

pdp connections idc

C.

fw ctl debug -m fw + nac

D.

adlog

Buy Now
Questions 18

What is the function of the Core Dump Manager utility?

Options:

A.

To determine which process is slowing down the system

B.

To send crash information to an external analyzer

C.

To limit the number of core dump files per process as well as the total amount of disk space used by core files

D.

To generate a new core dump for analysis

Buy Now
Questions 19

What information does the doctor-log script supply?

Options:

A.

Logging errors. Exceptions, Repair options

B.

Current and daily average logging rates. Indexing status, Size

C.

Logging rates, Logging Directories, List of troubleshooting tips

D.

Repair options. Logging Rates, Logging Directories

Buy Now
Questions 20

You receive reports from multiple users that they cannot browse Upon further discovery you identify that Identity Awareness cannot identify the users properly and apply the configuredAccess Roles

What commands you can use to troubleshoot all identity collectors and identity providers from the command line?

Options:

A.

on the gateway: pdp debug set IDC all IDP all

B.

on the gateway: pdp debug set AD all and IDC all

C.

on the management: pdp debug on IDC all

D.

on the management: pdp debug set all

Buy Now
Questions 21

The Check Point Watch Daemon (CPWD) monitors critical Check Point processes, terminating them or restarting them as needed to maintain consistent, stable operating conditions. When checking the status/output of CPWD you are able to see some columns like APP, PID, STAT, START, etc. What is the column "STAT" used for?

Options:

A.

Shows the Watch Dog name of the monitored process

B.

Shows the status of the monitored process

C.

Shows how many times the Watch Dog started the monitored process

D.

Shows what monitoring method Watch Dog is using to track the process

Buy Now
Questions 22

RAD is initiated when Application Control and URL Filtering blades are active on the Security Gateway. What is the purpose of the following RAD configuration file $FWDIR/conf/rad_settings.C?

Options:

A.

This file contains the location information for Application Control and/or URL Filtering entitlements

B.

This file contains the information on how the Security Gateway reaches the Security Management Server's RAD service for Application Control and URL Filtering

C.

This file contains RAD proxy settings

D.

This file contains all the host name settings for the online application detection engine

Buy Now
Questions 23

User defined URLS and HTTPS inspection User defined URLs on the Security Gateway are stored in which database file?

Options:

A.

https_urif.bin

B.

urlf db.bin

C.

urtf_https.bin

D.

https_db.bin

Buy Now
Questions 24

What Check Point process controls logging?

Options:

A.

FWD

B.

CPVVD

C.

CPM

D.

CPD

Buy Now
Questions 25

Which command is used to write a kernel debug to a file?

Options:

A.

fw ctl kdebug -T -I > debug.txt

B.

fw ctl debug -S -t > debug.txt

C.

fw ctl kdebug -T -f > debug.txt

D.

fw ctl debut -T -f > debug.txt

Buy Now
Questions 26

What is the simplest and most efficient way to check all dropped packets in real time?

Options:

A.

tail -f $FWDIR/log/fw.log |grep drop in expert mode

B.

cat /dev/fw1/log in expert mode

C.

fw ctl zdebug + drop in expert mode

D.

Smartlog

Buy Now
Questions 27

If the cpsemd process of SmartEvent has crashed or is having trouble coming up, then it usually indicates that __________.

Options:

A.

The SmartEvent core on the Solr indexer has been deleted

B.

The loqqed in administrator does not have permissions to run SmartEvent

C.

Postgres database is down

D.

Cpd daemon is unable to connect to the log server

Buy Now
Questions 28

What file contains the RAD proxy settings?

Options:

A.

rad_control.C

B.

rad_scheme.C

C.

rad_services.C

D.

rad_settings.C

Buy Now
Questions 29

The FileApp parser in the Content Awareness engine does not extract text from which of the following file types?

Options:

A.

Microsoft Office Excel files

B.

Microsoft Office PowerPoint files

C.

Microsoft Office.docx files

D.

PDFs

Buy Now
Questions 30

The two procedures available for debugging in the firewall kernel are

i. fw ctl zdebug

ii. fw ctl debug/kdebug

Choose the correct statement explaining the differences in the two

Options:

A.

(i) is used to debug only issues related to dropping of traffic, however (ii) can be used for any firewall issue including NATing, clustering etc.

B.

(i) is used to debug the access control policy only, however (ii) can be used to debug a unified policy

C.

(i) is used on a Security Gateway, whereas (ii) is used on a Security Management Server

D.

(i) is used for general debugging, has a small buffer and is a quick way to set kernel debug flags to getan output via command line whereas (ii) is useful when there is a need for detailed debugging and requires additional steps to set the buffer and get an output via command line

Buy Now
Questions 31

When URL category is not found in the kernel cache, what action will GW do?

Options:

A.

RAD In user space will forward request to the cloud

B.

GW will update kernel cache during next policy install

C.

RAD in kernel space will forward request to the cloud

D.

RAD forwards this request to CMI which is the brain of inspection

Buy Now
Questions 32

What is the benefit of fw ctl debug over fw ctl zdebug?

Options:

A.

There is no difference Both are used for debugging kernel

B.

You don't need timestamps

C.

It allows you to debug multiple modules at the same time

D.

You only need 1MB buffer

Buy Now

CCTE |

Exam Code: 156-587
Exam Name: Check Point Certified Troubleshooting Expert - R81.20 (CCTE)
Last Update: Jun 18, 2025
Questions: 109
156-587 pdf

156-587 PDF

$29.75  $84.99
156-587 Engine

156-587 Testing Engine

$35  $99.99
156-587 PDF + Engine

156-587 PDF + Testing Engine

$47.25  $134.99