Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

156-587 Check Point Certified Troubleshooting Expert - R81.20 (CCTE) Questions and Answers

Questions 4

After kernel debug with “fw ctl debug you received a huge amount of information It was saved in a very large file that is difficult to open and analyze with standard text editors Suggest a solution to

solve this issue

Options:

A.

Reduce debug buffer to 1024KB and run debug for several times

B.

Use Check Point InfoView utility to analyze debug output

C.

Use “fw ctl zdebug because of 1024KB buffer size

D.

Divide debug information into smaller files. Use “ fw ctl kdebug -f -o “filename -m 25 - s ‘’1024’’

Buy Now
Questions 5

You need to run a kernel debug over a longer period of time as the problem occurs only once or twice a week Therefore you need to add a timestamp to the kernel debug and write the output to a file. What is the correct syntax for this?

Options:

A.

fw ctl debug -T -f > filename debug

B.

fw ctl kdebug -T -f -o filename debug

C.

fw ell kdebug -T > filename debug

D.

fw ctl kdebug -T -f > filename.debug

Buy Now
Questions 6

When debugging is enabled on firewall kernel module using the fw ctl debug' command with required options, many debug messages are provided by the kernel that help the administrator to identify

Issues. Which of the following is true about these debug messages generated by the kernel module?

Options:

A.

Messages are written to /etc/dmesg file

B.

Messages are written to a buffer and collected using ‘fw ctl kdebug

C.

Messages are written to SFWDIR

D.

Messages are written to console and also /var/log/messages file

Buy Now
Questions 7

What components make up the Context Management Infrastructure?

Options:

A.

CPMI and FW Loader

B.

CPX and FWM

C.

CPM and SOLR

D.

CMI Loader and Pattern Matcher

Buy Now
Questions 8

Check Point Access Control Daemons contains several daemons for Software Blades and features. Which Daemon is used for Application & Control URL Filtering?

Options:

A.

pdpd

B.

rad

C.

cprad

D.

pepd

Buy Now
Questions 9

What Check Point process controls logging?

Options:

A.

FWD

B.

CPVVD

C.

CPM

D.

CPD

Buy Now
Questions 10

What is the kernel process for Content Awareness that collects the data from the contexts received from the CMI and decides if the file is matched by a data type?

Options:

A.

cntawmod

B.

cntmgr

C.

dlpda

D.

dlpu

Buy Now
Questions 11

Which of the following commands can be used to see the list of processes monitored by the Watch Dog process?

Options:

A.

cpstat fw -f watchdog

B.

fw ctl get str watchdog

C.

cpwd_admin list

D.

ps -ef | grep watchd

Buy Now
Questions 12

Check Point provides tools & commands to help you to identify issues about products and applications. Which Check Point command can help you to display status and statistics information for various Check Point products and applications?

Options:

A.

CPview

B.

cpstat

C.

fwstat

D.

CPstat

Buy Now
Questions 13

John has renewed his NPTX License but he gets an error (contract for Anti-Bot expired). He wants to check the subscription status on the CLI of the gateway, what command can he use for this?

Options:

A.

fwm lie print

B.

fw monitor license status

C.

cpstat antimalware-f subscription status

D.

show license status

Buy Now
Questions 14

The Check Point Firewall Kernel is the core component of the Gaia operating system and an integral part of traffic inspection process. There are two procedures available for debugging the firewall kernel. Which procedure/command is used for detailed troubleshooting and needs more resources?

Options:

A.

fw ctl zdebug

B.

fw debug/kdebug

C.

fw ctl debug/kdebug

D.

fw debug/kdebug ctl

Buy Now
Questions 15

What tool would you run to diagnose logging and indexing?

Options:

A.

run cpm_doctor.sh

B.

cpstat mg -f log_server

C.

run diagnostic view

D.

run doctor-log.sh

Buy Now
Questions 16

Your users have some issues connecting with Mobile Access VPN to your gateway. How can you debug the tunnel establishment?

Options:

A.

run vpn debug truncon

B.

in the file $VPNDIR/conf/httpd conf change the line Loglevel To LogLevel debug and run vpn restart

C.

in the file SCVPNDIR/conf/httpd conf change the line Loglevel To LogLevel debug and run cvpnrestart

D.

run fw ctl zdebug -m sslvpn all

Buy Now
Questions 17

Which of the following inputs is suitable for debugging HTTPS inspection issues?

Options:

A.

fw debug tls on TDERROR_ALL_ALL=5

B.

fw ctl debug -m fw + conn drop cptls

C.

vpn debug cptls on

D.

fw diag debug tls enable

Buy Now
Questions 18

Which of the following is contained in the System Domain of the Postgres database?

Options:

A.

Trusted GUI clients

B.

Configuration data of log servers

C.

Saved queries for applications

D.

User modified configurations such as network objects

Buy Now
Questions 19

What is the function of the Core Dump Manager utility?

Options:

A.

To determine which process is slowing down the system

B.

To send crash information to an external analyzer

C.

To limit the number of core dump files per process as well as the total amount of disk space used by core files

D.

To generate a new core dump for analysis

Buy Now
Questions 20

What cli command is run on the GW to verify communication to the identity Collector?

Options:

A.

pdp connections idc

B.

pep connections idc

C.

show idc connections

D.

fwd connected

Buy Now
Questions 21

What is the proper command for allowing the system to create core files?

Options:

A.

service core-dump start

B.

SFWDIR/scripts/core-dump-enable.sh

C.

set core-dump enable

> save config

D.

# set core-dump enable

# save config

Buy Now
Questions 22

You run cpwd_admin list on a Security Gateway and notice that the CPM process is not listed. Select the best answer.

Options:

A.

The output is different between Gateway and Management Server.

B.

CPM is not running and can’t be monitored by WatchDog.

C.

If you want to monitor CPM, you have to manually add it to WatchDog.

D.

CPM is not there because it has its own monitoring system. Only lower processes are monitored by WatchDog.

Buy Now
Questions 23

You are using the identity Collector with identity Awareness in large environment. Users report that they cannot access resources on Internet You identify that the traffic is matching the cleanup rule

Instead of the proper rule with Access Roles using the IDC How can you check if IDC is working?

Options:

A.

pdp connections idc

B.

ad query I debug on

C.

pep debug idc on

D.

pdp debug set IDP all

Buy Now
Questions 24

Which two files contain the Application Database on the Security Gateway?

Options:

A.

api_db.C and api_custom_db.C

B.

apcl_db.C and apd_custom_db.C

C.

application_db.C and application_custom_db.C

D.

appi_db.C and appi_custom_db.C

Buy Now
Questions 25

Captive Portal, PDP and PEP run in what space?

Options:

A.

User

B.

CPM

C.

FWD

D.

Kernel

Buy Now
Questions 26

You receive reports from multiple users that they cannot browse Upon further discovery you identify that Identity Awareness cannot identify the users properly and apply the configuredAccess Roles

What commands you can use to troubleshoot all identity collectors and identity providers from the command line?

Options:

A.

on the gateway: pdp debug set IDC all IDP all

B.

on the gateway: pdp debug set AD all and IDC all

C.

on the management: pdp debug on IDC all

D.

on the management: pdp debug set all

Buy Now
Questions 27

What command would you run to verify the communication between the Security Gateway and the Identity Collector?

Options:

A.

fw ctl debug -m IDAPI

B.

pdp connections idc

C.

fw ctl debug -m fw + nac

D.

adlog

Buy Now
Questions 28

User defined URLS and HTTPS inspection User defined URLs on the Security Gateway are stored in which database file?

Options:

A.

https_urif.bin

B.

urlf db.bin

C.

urtf_https.bin

D.

https_db.bin

Buy Now
Questions 29

In some scenarios it is very helpful to use advanced Linux commands for troubleshooting purposes. Which command displays information about resource utilization for running processes and shows additional information for core utilization and memory?

Options:

A.

top

B.

vmstat

C.

cptop

D.

mpstat

Buy Now
Questions 30

What is the most efficient way to read an IKEv2 Debug?

Options:

A.

IKEview

B.

vi on the cti

C.

notepad++

D.

any xml editor

Buy Now
Questions 31

Where do you enable log indexing on the SMS?

Options:

A.

SMS object under "Other"

B.

SMS object under "Advanced"

C.

SMS object under "Logs"

D.

SMS object under "General Properties"

Buy Now
Questions 32

The Check Point Watch Daemon (CPWD) monitors critical Check Point processes, terminating them or restarting them as needed to maintain consistent, stable operating conditions. When checking the status/output of CPWD you are able to see some columns like APP, PID, STAT, START, etc. What is the column "STAT" used for?

Options:

A.

Shows the Watch Dog name of the monitored process

B.

Shows the status of the monitored process

C.

Shows how many times the Watch Dog started the monitored process

D.

Shows what monitoring method Watch Dog is using to track the process

Buy Now
Exam Code: 156-587
Exam Name: Check Point Certified Troubleshooting Expert - R81.20 (CCTE)
Last Update: Apr 30, 2026
Questions: 109

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now 156-587 testing engine

PDF (Q&A)

$43.57  $124.49
buy now 156-587 pdf