Labour Day Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

Note! The 156-585 Exam is no longer available. Get in touch with our Live Chat or email us for more information about the 156-586 Exam.

156-585 Check Point Certified Troubleshooting Expert Questions and Answers

Questions 4

What process is responsible for sending and receiving logs in the management server?

Options:

A.

FWD

B.

CPM

C.

FWM

D.

CPD

Buy Now
Questions 5

Which command(s) will turn off all vpn debug collection?

Options:

A.

vpn debug off

B.

vpn debug -a off

C.

vpn debug off and vpn debug ikeoff

D.

fw ctl debug 0

Buy Now
Questions 6

Your users have some issues connecting Mobile Access VPN to the gateway. How can you debug the tunnel establishment?

Options:

A.

in the file $CVPNDIR/conf/httpd.conf change the line loglevel .. To LogLevel debug and run cvpnrestart

B.

run vpn debug truncon

C.

run fw ctl zdebug -m sslvpn all

D.

in the file $VPNDIR/conf/httpd.conf the line Loglevel .. To LogLevel debug and run vpn restart

Buy Now
Questions 7

Which of the following is a component of the Context Management Infrastructure used to collect signatures in user space from multiple sources, such as Application Control and IPS. and compiles them together into unified Pattern Matchers?

Options:

A.

CMI Loader

B.

cpas

C.

PSL - Passive Signature Loader

D.

Context Loader

Buy Now
Questions 8

When a User process or program suddenly crashes, a core dump is often used to examine the problem. Which command is used to enable the core-dumping via GAIA dish?

Options:

A.

set core-dump enable

B.

set core-dump per_process

C.

set user-dump enable

D.

set core-dump total

Buy Now
Questions 9

You are trying to establish a VPN tunnel between two Security Gateways but fail. What initial steps will you make to troubleshoot the issue

Options:

A.

capture traffic on both tunnel members and collect debug of IKE and VPND daemon

B.

capture traffic on both tunnel members and collect kernel debug for fw module with vm, crypt, conn and drop flags, then collect debug of IKE and VPND daemon

C.

collect debug of IKE and VPND daemon and collect kernel debug for fw module with vm, crypt, conn and drop flags

D.

capture traffic on both tunnel members and collect kernel debug for fw module with vm, crypt, conn and drop flags

Buy Now
Questions 10

The management configuration stored in the Postgres database is partitioned into several relational database Domains, like - System, User, Global and Log Domains. The User Domain stores the network objects and security policies. Which of the following is stored in the Log Domain?

Options:

A.

Configuration data of Log Servers and saved queries for applications

B.

Active Logs received from Security Gateways and Management Servers

C.

Active and past logs received from Gateways and Servers

D.

Log Domain is not stored in Postgres database, it is part of Solr indexer only

Buy Now
Questions 11

James is using the same filter expression in fw monitor for CITRIX very often and instead of typing this all the time he wants to add it as a macro to the fw monitor definition file. What’s the name and location of this file?

Options:

A.

$FWDIR/lib/fwmonltor.def

B.

$FWDIR/conf/fwmonltor.def

C.

$FWDIR/lib/tcpip.def

D.

$FWDIR/lib/fw.monitor

Buy Now
Questions 12

The Check Point Firewall Kernel is the core component of the Gala operating system and an integral part of traffic inspection process. There are two procedures available for debugging the firewall kernel. Which procedure/command is used for detailed troubleshooting and needs more resources?

Options:

A.

fw ctl debug/kdebug

B.

fw ctl zdebug

C.

fw debug/kdebug

D.

fw debug/kdebug ctl

Buy Now
Questions 13

You need to run a kernel debug over a longer period of time as the problem occurs only once or twice a week. Therefore you need to add a timestamp to the kernel debug and write the output to a file What is the correct syntax for this?

Options:

A.

fw ctl kdebug -T -f > filename.debug

B.

fw ctl kdebug -T > filename.debug

C.

fw ctl debug -T -f > filename.debug

D.

fw ctl kdebug -T -f -o filename.debug

Buy Now
Questions 14

What file contains the RAD proxy settings?

Options:

A.

rad_settings.C

B.

rad_services.C

C.

rad_scheme.C

D.

rad_control.C

Buy Now
Questions 15

Which of the following is NOT a vpn debug command used for troubleshooting?

Options:

A.

fw ctl debug -m fw + conn drop vm crypt

B.

vpn debug trunc

C.

pclient getdata sslvpn

D.

vpn debug on TDERROR_ALL_ALL=5

Buy Now
Questions 16

What is the buffer size set by the fw ctl zdebug command?

Options:

A.

1 MB

B.

1 GB

C.

8MB

D.

8GB

Buy Now
Questions 17

Rules within the Threat Prevention policy use the Malware database and network objects. Which directory is used for the Malware database?

Options:

A.

$FWDIR/conf/install_manager_tmp/ANTIMALWARE/conf/

B.

$CPDIR/conf/install_manager_lmp/ANTIMALWARE/conf/

C.

$FWDlR/conf/install_firewall_imp/ANTIMALWARE/conf/

D.

$FWDlR/log/install_manager_tmp/ANTIMALWARBlog?

Buy Now
Exam Code: 156-585
Exam Name: Check Point Certified Troubleshooting Expert
Last Update: Apr 14, 2023
Questions: 114