Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

156-587 Check Point Certified Troubleshooting Expert - R81.20 (CCTE) Questions and Answers

Questions 4

Which of the following commands can be used to see the list of processes monitored by the Watch Dog process?

Options:

A.

cpstat fw -f watchdog

B.

fw ctl get str watchdog

C.

cpwd_admin list

D.

ps -ef | grep watchd

Buy Now
Questions 5

Which kernel process is used by Content Awareness to collect the data from contexts?

Options:

A.

PDP

B.

cpemd

C.

dlpda

D.

CMI

Buy Now
Questions 6

You run a free-command on a gateway and notice that the Swap column is not zero Choose the best answer

Options:

A.

Utilization of ram is high and swap file had to be used

B.

Swap file is used regularly because RAM memory is reserved for management traffic

C.

Swap memory is used for heavy connections when RAM memory is full

D.

Its ole Swap is used to increase performance

Buy Now
Questions 7

During firewall kernel debug with fw ctl zdebug you received less information that expected. You noticed that a lot of messages were lost since the time the debug was started. What should you do to

resolve this issue?

Options:

A.

Increase debug buffer Use fw ctl debug -buf 32768

B.

Redirect debug output to file; Use fw ctl debug -o /debug.elg

C.

Redirect debug output to file; Use fw ctl zdebug -o /debug.elg

D.

Increase debug buffer; Use fw ctl zdebug -buf 32768

Buy Now
Questions 8

If the cpsemd process of SmartEvent has crashed or is having trouble coming up, then it usually indicates that __________.

Options:

A.

The SmartEvent core on the Solr indexer has been deleted

B.

The loqqed in administrator does not have permissions to run SmartEvent

C.

Postgres database is down

D.

Cpd daemon is unable to connect to the log server

Buy Now
Questions 9

Your users have some issues connecting with Mobile Access VPN to your gateway. How can you debug the tunnel establishment?

Options:

A.

run vpn debug truncon

B.

in the file $VPNDIR/conf/httpd conf change the line Loglevel To LogLevel debug and run vpn restart

C.

in the file SCVPNDIR/conf/httpd conf change the line Loglevel To LogLevel debug and run cvpnrestart

D.

run fw ctl zdebug -m sslvpn all

Buy Now
Questions 10

You were asked by security team to debug Mobile Access VPN. What processes will you debug?

Options:

A.

HTTPD and CPVND

B.

IKED

C.

VPND and IKED

D.

SNX daemon

Buy Now
Questions 11

What command would you run to verify the communication between the Security Gateway and the Identity Collector?

Options:

A.

fw ctl debug -m IDAPI

B.

pdp connections idc

C.

fw ctl debug -m fw + nac

D.

adlog

Buy Now
Questions 12

Which of the following daemons is used for Threat Extraction?

Options:

A.

extractd

B.

tedex

C.

tex

D.

scrubd

Buy Now
Questions 13

You need to run a kernel debug over a longer period of time as the problem occurs only once or twice a week. Therefore you need to add a timestamp to the kernel debug and write the output to a file

but you cant afford to fill up all the remaining disk space and you only have 10 GB free for saving the debugs What is the correct syntax for this?

Options:

A.

A fw ctl kdebug -T -f -m 10 -s 1000000 -o debugfilename

B.

fw ctl debug -T -f-m 10 -s 1000000 -o debugfilename

C.

fw ctl kdebug -T -f -m 10 -s 1000000 > debugfilename

D.

fw ctl kdebug -T -m 10 -s 1000000 -o debugfilename

Buy Now
Questions 14

Which of the following inputs is suitable for debugging HTTPS inspection issues?

Options:

A.

fw debug tls on TDERROR_ALL_ALL=5

B.

fw ctl debug -m fw + conn drop cptls

C.

vpn debug cptls on

D.

fw diag debug tls enable

Buy Now
Questions 15

What is the Security Gateway directory where an administrator can find vpn debug log files generated during Site-to-Site VPN troubleshooting?

Options:

A.

SFWDIR/conf/

B.

SCPDIR/conf/

C.

SFWDIR/log/

D.

opt/CPsuiteR80/vpn/log/

Buy Now
Questions 16

Which two files contain the Application Database on the Security Gateway?

Options:

A.

api_db.C and api_custom_db.C

B.

apcl_db.C and apd_custom_db.C

C.

application_db.C and application_custom_db.C

D.

appi_db.C and appi_custom_db.C

Buy Now
Questions 17

Which of the following would NOT be a flag when debugging a unified policy?

Options:

A.

tls

B.

rulebase

C.

clob

D.

connection

Buy Now
Questions 18

Troubleshooting issues with Mobile Access requires the following:

Options:

A.

'ma_vpnd' process on Security Gateway

B.

Debug logs of FWD captured with the command - ‘fw debug fwd on TDERROR_MOBILE_ACCESS=5'

C.

Standard VPN debugs, packet captures and debugs of cvpnd1 process on Security Gateway

D.

Standard VPN debugs and packet captures on Security Gateway, debugs of 'cvpnd' process on Security Management

Buy Now
Questions 19

What function receives the AD log event information?

Options:

A.

FWD

B.

CPD

C.

PEP

D.

ADLOG

Buy Now
Questions 20

What is correct about the Resource Advisor (RAD) service on the Security Gateways?

Options:

A.

RAD is not a separate module, it is an integrated function of the ‘fw’ kernel module and does all operations in the kernel space

B.

RAD functions completely in user space The Pattern Matter (PM) module of the CMI looks up for URLs in the cache and if not found, contact the RAD process in user space to do online categorization

C.

RAD is completely loaded as a kernel module that looks up URL in cache and if not found connects online for categorization There is no user space involvement in this process

D.

RAD has a kernel module that looks up the kernel cache notifies client about hits and misses and forwards a-sync requests to RAD user space module which is responsible for online categorization

Buy Now
Questions 21

How many packets are needed to establish IKEv1?

Options:

A.

Only three packets for main mode

B.

8

C.

5

D.

6

Buy Now
Questions 22

The management configuration stored in the Postgres database is partitioned into several relational database domains. What is the purpose of the Global Domain?

Options:

A.

Global Domains is used by the IPS software blade to map the IDs to the corresponding countries according to the IpToCountry.csv file.

B.

This domain is used as the global database to back up the objects referencing the corresponding object attributes from the System Domain.

C.

This domain is used as the global database to track the changes made by multiple administrators on the same objects prior to publishing.

D.

This domain is used as the global database for MDSM and contains global objects and policies.

Buy Now
Questions 23

For Identity Awareness, what is the PDP process?

Options:

A.

Identity server

B.

Log Sifter

C.

Captive Portal Service

D.

UserAuth Database

Buy Now
Questions 24

In Check Point's Packet Processing Infrastructure what is the role of Observers?

Options:

A.

Observers attach object IDs to traffic

B.

They store Rule Base matching state related information

C.

Observers monitor the state of Check Point gateways and report it to the security manager

D.

Observers decide whether or not to publish a CLOB to the Security Policy

Buy Now
Questions 25

What is the buffer size set by the fw ctl zdebug command?

Options:

A.

8GB

B.

1 MB

C.

1 GB

D.

8 MB

Buy Now
Questions 26

After kernel debug with “fw ctl debug you received a huge amount of information It was saved in a very large file that is difficult to open and analyze with standard text editors Suggest a solution to

solve this issue

Options:

A.

Reduce debug buffer to 1024KB and run debug for several times

B.

Use Check Point InfoView utility to analyze debug output

C.

Use “fw ctl zdebug because of 1024KB buffer size

D.

Divide debug information into smaller files. Use “ fw ctl kdebug -f -o “filename -m 25 - s ‘’1024’’

Buy Now
Questions 27

Packet processing infrastructure consists of the following components EXCEPT:

Options:

A.

Observers

B.

Manager

C.

Client

D.

Classifiers

Buy Now
Questions 28

What is the function of the Core Dump Manager utility?

Options:

A.

To determine which process is slowing down the system

B.

To send crash information to an external analyzer

C.

To limit the number of core dump files per process as well as the total amount of disk space used by core files

D.

To generate a new core dump for analysis

Buy Now
Questions 29

What is the proper command for allowing the system to create core files?

Options:

A.

service core-dump start

B.

SFWDIR/scripts/core-dump-enable.sh

C.

set core-dump enable

>save config

D.

# set core-dump enable

# save config

Buy Now
Questions 30

Which of these packet processing components stores Rule Base matching state-related information?

Options:

A.

Classifiers

B.

Manager

C.

Handlers

D.

Observers

Buy Now
Questions 31

What is the name of the VPN kernel process?

Options:

A.

VPND

B.

CVPND

C.

FWK

D.

VPNK

Buy Now
Questions 32

What is the correct syntax to turn a VPN debug on and create new empty debug files'?

Options:

A.

vpndebug trunc on

B.

vpn debug truncon

C.

vpn debug trunkon

D.

vpn kdebug on

Buy Now
Exam Code: 156-587
Exam Name: Check Point Certified Troubleshooting Expert - R81.20 (CCTE)
Last Update: Jun 15, 2025
Questions: 109
156-587 pdf

156-587 PDF

$29.75  $84.99
156-587 Engine

156-587 Testing Engine

$35  $99.99
156-587 PDF + Engine

156-587 PDF + Testing Engine

$47.25  $134.99