Weekend Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

156-587 Sample Questions Answers

Questions 4

In some scenarios it is very helpful to use advanced Linux commands for troubleshooting purposes. Which command displays information about resource utilization for running processes and shows additional information for core utilization and memory?

Options:

A.

top

B.

vmstat

C.

cptop

D.

mpstat

Buy Now
Questions 5

PostgreSQL is a powerful, open source relational database management system. Check Point offers a command for viewing the database to interact with Postgres interactive shell. Which command do you need to enter the PostgreSQL interactive shell?

Options:

A.

mysql_client cpm postgres

B.

mysql -u root

C.

psql_client cpm postgres

D.

psql_client postgres cpm

Buy Now
Questions 6

What is the buffer size set by the fw ctl zdebug command?

Options:

A.

8GB

B.

1 MB

C.

1 GB

D.

8 MB

Buy Now
Questions 7

If the cpsemd process of SmartEvent has crashed or is having trouble coming up, then it usually indicates that __________.

Options:

A.

The SmartEvent core on the Solr indexer has been deleted

B.

The loqqed in administrator does not have permissions to run SmartEvent

C.

Postgres database is down

D.

Cpd daemon is unable to connect to the log server

Buy Now
Questions 8

What is the correct syntax to turn a VPN debug on and create new empty debug files'?

Options:

A.

vpndebug trunc on

B.

vpn debug truncon

C.

vpn debug trunkon

D.

vpn kdebug on

Buy Now
Questions 9

SmartEvent utilizes the Log Server, Correlation Unit and SmartEvent Server to aggregate logs and identify security events. The three main processes that govern these SmartEvent components are:

Options:

A.

cpcu, cplog, cpse

B.

eventiasv, eventiarp,eventiacu

C.

cpsemd, cpsead, and DBSync

D.

fwd, secu, sesrv

Buy Now
Questions 10

Which of the following inputs is suitable for debugging HTTPS inspection issues?

Options:

A.

fw debug tls on TDERROR_ALL_ALL=5

B.

fw ctl debug -m fw + conn drop cptls

C.

vpn debug cptls on

D.

fw diag debug tls enable

Buy Now
Questions 11

Like a Site-to-Site VPN between two Security Gateways, a Remote Access VPN relies on the Internet Key Exchange (IKE) what types of keys are generated by IKE during negotiation?

Options:

A.

Produce a symmetric key on both sides

B.

Produce an asymmetric key on both sides

C.

Symmetric keys based on pre-shared secret

D.

Produce a pair of public and private keys

Buy Now
Questions 12

In Check Point's Packet Processing Infrastructure what is the role of Observers?

Options:

A.

Observers attach object IDs to traffic

B.

They store Rule Base matching state related information

C.

Observers monitor the state of Check Point gateways and report it to the security manager

D.

Observers decide whether or not to publish a CLOB to the Security Policy

Buy Now
Questions 13

What file contains the RAD proxy settings?

Options:

A.

rad_control.C

B.

rad_scheme.C

C.

rad_services.C

D.

rad_settings.C

Buy Now
Questions 14

Which of the following is a component of the Context Management Infrastructure used to collect signatures in user space from multiple sources such as Application Control and IPS. and compiles them together into unified Pattern Matchers?

Options:

A.

Context Loader

B.

PSL - Passive Signature Loader

C.

cpas

D.

CMI Loader

Buy Now
Questions 15

How many packets are needed to establish IKEv1?

Options:

A.

Only three packets for main mode

B.

8

C.

5

D.

6

Buy Now
Questions 16

Captive Portal, PDP and PEP run in what space?

Options:

A.

User

B.

CPM

C.

FWD

D.

Kernel

Buy Now
Questions 17

You need to run a kernel debug over a longer period of time as the problem occurs only once or twice a week Therefore you need to add a timestamp to the kernel debug and write the output to a file. What is the correct syntax for this?

Options:

A.

fw ctl debug -T -f > filename debug

B.

fw ctl kdebug -T -f -o filename debug

C.

fw ell kdebug -T > filename debug

D.

fw ctl kdebug -T -f > filename.debug

Buy Now
Questions 18

Where will the usermode core files located?

Options:

A.

$FWDIRVar/log/dump/usermode

B.

/var/suroot

C.

/var/log/dump/usermode

D.

$CPDIR/var/log/dump/usermode

Buy Now
Questions 19

What is correct about the Resource Advisor (RAD) service on the Security Gateways?

Options:

A.

RAD is not a separate module, it is an integrated function of the ‘fw’ kernel module and does all operations in the kernel space

B.

RAD functions completely in user space The Pattern Matter (PM) module of the CMI looks up for URLs in the cache and if not found, contact the RAD process in user space to do online categorization

C.

RAD is completely loaded as a kernel module that looks up URL in cache and if not found connects online for categorization There is no user space involvement in this process

D.

RAD has a kernel module that looks up the kernel cache notifies client about hits and misses and forwards a-sync requests to RAD user space module which is responsible for online categorization

Buy Now
Questions 20

What command(s) will turn off all vpn debug collection?

Options:

A.

vpn debug -a off

B.

fw ctl debug 0

C.

vpn debug off

D.

vpn debug off and vpn debug Ikeoff

Buy Now
Questions 21

You do not see logs in the SMS. When you login on the SMS shell and run cpwd_admin list you notice that the RFL process is with status T. What command can you run to try to resolve it?

Options:

A.

RFLstop and RFLstart

B.

evstart and evstop

C.

smartlog_server stop and smartlog_server restart

D.

rflsop and rflstart

Buy Now
Questions 22

You need to run a kernel debug over a longer period of time as the problem occurs only once or twice a week. Therefore you need to add a timestamp to the kernel debug and write the output to a file

but you cant afford to fill up all the remaining disk space and you only have 10 GB free for saving the debugs What is the correct syntax for this?

Options:

A.

A fw ctl kdebug -T -f -m 10 -s 1000000 -o debugfilename

B.

fw ctl debug -T -f-m 10 -s 1000000 -o debugfilename

C.

fw ctl kdebug -T -f -m 10 -s 1000000 > debugfilename

D.

fw ctl kdebug -T -m 10 -s 1000000 -o debugfilename

Buy Now
Questions 23

You are using the identity Collector with identity Awareness in large environment. Users report that they cannot access resources on Internet You identify that the traffic is matching the cleanup rule

Instead of the proper rule with Access Roles using the IDC How can you check if IDC is working?

Options:

A.

pdp connections idc

B.

ad query I debug on

C.

pep debug idc on

D.

pdp debug set IDP all

Buy Now
Questions 24

What is the shorthand reference for a classification object?

Options:

A.

classobj

B.

CLOB

C.

COBJ

D.

class.obj

Buy Now
Questions 25

Which of the following is contained in the System Domain of the Postgres database?

Options:

A.

Trusted GUI clients

B.

Configuration data of log servers

C.

Saved queries for applications

D.

User modified configurations such as network objects

Buy Now
Questions 26

What process monitors terminates, and restarts critical Check Point processes as necessary?

Options:

A.

CPM

B.

FWD

C.

CPWD

D.

FWM

Buy Now
Questions 27

What tool would you run to diagnose logging and indexing?

Options:

A.

run cpm_doctor.sh

B.

cpstat mg -f log_server

C.

run diagnostic view

D.

run doctor-log.sh

Buy Now
Questions 28

What is NOT a benefit of the ‘fw ctl zdebug’ command?

Options:

A.

Automatically allocate a 1MB buffer

B.

Collect debug messages from the kernel

C.

Cannot be used to debug additional modules

D.

Clean the buffer

Buy Now
Questions 29

During firewall kernel debug with fw ctl zdebug you received less information that expected. You noticed that a lot of messages were lost since the time the debug was started. What should you do to

resolve this issue?

Options:

A.

Increase debug buffer Use fw ctl debug -buf 32768

B.

Redirect debug output to file; Use fw ctl debug -o /debug.elg

C.

Redirect debug output to file; Use fw ctl zdebug -o /debug.elg

D.

Increase debug buffer; Use fw ctl zdebug -buf 32768

Buy Now
Questions 30

What is NOT monitored as a PNOTE by ClusterXL?

Options:

A.

TED

B.

Policy

C.

RouteD

D.

VPND

Buy Now
Questions 31

What function receives the AD log event information?

Options:

A.

FWD

B.

CPD

C.

PEP

D.

ADLOG

Buy Now
Questions 32

Which of the following daemons is used for Threat Extraction?

Options:

A.

extractd

B.

tedex

C.

tex

D.

scrubd

Buy Now
Exam Code: 156-587
Exam Name: Check Point Certified Troubleshooting Expert - R81.20 (CCTE)
Last Update: Jul 26, 2025
Questions: 109
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now 156-587