Pass the Checkpoint CCTA 156-582 Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

What is the difference between the “Super User" and “Read Write All" SmartConsole permission profiles?

Options:

A.

“Read Write All" has the extra ability to make changes within the Gaia operating system


B.

“Super User” has the extra ability to administer other administrative accounts


C.

“Super User” has the extra ability to make changes within the Gaia operating system


D.

“Super User" had the extra ability of being able to use the Management API


Expert Solution
Questions # 2:

Where would you look to find the error log file to investigate a logging issue on the Security Management Server?

Options:

A.

SFWDIR/log/fwd.elg


B.

SCPDIR/log/cpd.elg


C.

SMDS_FWDIR/log/cpm.elg


D.

SFWDIR/log/fwm.elg


Expert Solution
Questions # 3:

Which of the following is NOT a way to insert fw monitor into the chain when troubleshooting packets throughout the chain?

Options:

A.

Relative position using id


B.

Absolute position


C.

Relative position using location


D.

Relative position using alias


Expert Solution
Questions # 4:

How many different types of Service Requests exist?

Options:

A.

4


B.

2


C.

3


D.

5


Expert Solution
Questions # 5:

What is the process of intercepting and logging traffic?

Options:

A.

Debugging


B.

Forensics Analysis


C.

Logging


D.

Packet Capturing


Expert Solution
Questions # 6:

What is the name of a protocol for VPN establishment and negotiation?

Options:

A.

NAT-T


B.

IPsec


C.

VPN


D.

IKE


Expert Solution
Questions # 7:

When is the Enable Bypass Under Load used in IPS?

Options:

A.

When the threshold is reached for connections and throughput


B.

When there is a problem with IPS and connectivity cannot be guaranteed


C.

When the threshold is reached for CPU and memory


D.

When there is an ongoing attack, the Security Gateway puts its state to maintenance mode to prevent attackers from breaching the network


Expert Solution
Questions # 8:

After reviewing the Install Policy report and error codes listed in it, you need to check if the policy installation port is open on the Security Gateway. What is the correct port to check?

Options:

A.

19009


B.

18190


C.

18210


D.

18191


Expert Solution
Questions # 9:

How do you verify that Proxy ARP entries are loaded into the kernel?

Options:

A.

fw ctl arp


B.

show arp dynamic all


C.

This information can be viewed in the logs, under NAT section of log, field: Proxy ARP entry


D.

fw ctl get arp list all


Expert Solution
Questions # 10:

The Check Point FW Monitor tool captures and analyzes incoming packets at multiple points in the traffic inspections. Which of the following is the correct inspection flow for traffic?

Options:

A.

(i) - pre-inbound, (I) - post-inbound, (o) - pre-outbound, (O) - post-outbound


B.

(o) - pre-outbound, (O) - post-inbound, (i) - pre-inbound, (I) - post-inbound


C.

(O) - post-outbound, (o) - pre-outbound, (I) - post-inbound, (i) - pre-inbound


D.

(1) - pre-inbound, (i) - post-inbound, (O) - pre-outbound, (o) - post-outbound


Expert Solution
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions