Pass the Checkpoint CCTE 156-587 Questions and answers with CertsForce

Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions
Questions # 1:

After kernel debug with “fw ctl debug you received a huge amount of information It was saved in a very large file that is difficult to open and analyze with standard text editors Suggest a solution to

solve this issue

Options:

A.

Reduce debug buffer to 1024KB and run debug for several times


B.

Use Check Point InfoView utility to analyze debug output


C.

Use “fw ctl zdebug because of 1024KB buffer size


D.

Divide debug information into smaller files. Use “ fw ctl kdebug -f -o “filename -m 25 - s ‘’1024’’


Expert Solution
Questions # 2:

URL Filtering is an essential part of Web Security in the Gateway. For the Security Gateway to perform a URL lookup when a client makes a URL request, where is the sync-request forwarded from if a sync-request is required?

Options:

A.

URLF Kernel Client


B.

RAD User Space


C.

RAD Kernel Space


D.

URLF Online Service


Expert Solution
Questions # 3:

What is the shorthand reference for a classification object?

Options:

A.

classobj


B.

CLOB


C.

COBJ


D.

class.obj


Expert Solution
Questions # 4:

You are using the identity Collector with identity Awareness in large environment. Users report that they cannot access resources on Internet You identify that the traffic is matching the cleanup rule

Instead of the proper rule with Access Roles using the IDC How can you check if IDC is working?

Options:

A.

pdp connections idc


B.

ad query I debug on


C.

pep debug idc on


D.

pdp debug set IDP all


Expert Solution
Questions # 5:

You run cpwd_admin list on a Security Gateway and notice that the CPM process is not listed. Select the best answer.

Options:

A.

The output is different between Gateway and Management Server.


B.

CPM is not running and can’t be monitored by WatchDog.


C.

If you want to monitor CPM, you have to manually add it to WatchDog.


D.

CPM is not there because it has its own monitoring system. Only lower processes are monitored by WatchDog.


Expert Solution
Questions # 6:

When viewing data for CPMI objects in the Postgres database, what table column should be selected to query for the object instance?

Options:

A.

CpmiHostCkp


B.

fwset


C.

CPM Global M


D.

GuiDBedit


Expert Solution
Questions # 7:

When debugging is enabled on firewall kernel module using the fw ctl debug' command with required options, many debug messages are provided by the kernel that help the administrator to identify

Issues. Which of the following is true about these debug messages generated by the kernel module?

Options:

A.

Messages are written to /etc/dmesg file


B.

Messages are written to a buffer and collected using ‘fw ctl kdebug


C.

Messages are written to SFWDIR


D.

Messages are written to console and also /var/log/messages file


Expert Solution
Questions # 8:

What does CMI stand for in relation to the Access Control Policy?

Options:

A.

Context Manipulation Interface


B.

Context Management Infrastructure


C.

Content Management Interface


D.

Content Matching Infrastructure


Expert Solution
Questions # 9:

What function receives the AD log event information?

Options:

A.

FWD


B.

CPD


C.

PEP


D.

ADLOG


Expert Solution
Questions # 10:

Which of the following daemons is used for Threat Extraction?

Options:

A.

extractd


B.

tedex


C.

tex


D.

scrubd


Expert Solution
Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions