Check Point 156-587 Practice Exams
Last updated on Apr 01,2025- Exam Code: 156-587
- Exam Name: Check Point Certified Troubleshooting Expert - R81.20 (CCTE)
- Certification Provider: Check Point
- Latest update: Apr 01,2025
You run a free-command on a gateway and notice that the Swap column is not zero Choose the best answer
- A . Utilization of ram is high and swap file had to be used
- B . Swap file is used regularly because RAM memory is reserved for management traffic
- C . Swap memory is used for heavy connections when RAM memory is full
- D . Its ole Swap is used to increase performance
During firewall kernel debug with fw ctl zdebug you received less information that expected. You noticed that a lot of messages were lost since the time the debug was started.
What should you do to resolve this issue?
- A . Increase debug buffer Use fw ctl debug -buf 32768
- B . Redirect debug output to file; Use fw ctl debug -o /debug.elg
- C . Redirect debug output to file; Use fw ctl zdebug -o /debug.elg
- D . Increase debug buffer; Use fw ctl zdebug -buf 32768
Which command is used to write a kernel debug to a file?
- A . fw ctl kdebug -T -I > debug.txt
- B . fw ctl debug -S -t > debug.txt
- C . fw ctl kdebug -T -f > debug.txt
- D . fw ctl debut -T -f > debug.txt
What is the benefit of fw ctl debug over fw ctl zdebug?
- A . There is no difference Both are used for debugging kernel
- B . You don’t need timestamps
- C . It allows you to debug multiple modules at the same time
- D . You only need 1MB buffer
How many packets are needed to establish IKEv1?
- A . Only three packets for main mode
- B . 8
- C . 5
- D . 6
What is the correct syntax to turn a VPN debug on and create new empty debug files’?
- A . vpndebug trunc on
- B . vpn debug truncon
- C . vpn debug trunkon
- D . vpn kdebug on
What command(s) will turn off all vpn debug collection?
- A . vpn debug -a off
- B . fw ctl debug 0
- C . vpn debug off
- D . vpn debug off and vpn debug Ikeoff
What are the three main component of Identity Awareness?
- A . Client, SMS and Secure Gateway
- B . Identity Source Identity Server (POP) and Identity Enforcement (PEP)
- C . Identity Awareness Blade on Security Gateway, User Database on Security Management Server and Active Directory
- D . User, Active Directory and Access Role
What file contains the RAD proxy settings?
- A . rad_control.C
- B . rad_scheme.C
- C . rad_services.C
- D . rad_settings.C
When a User process or program suddenly crashes, a core dump is often used to examine the problem.
Which command is used to enable the core-dumping via GAIA clish?
- A . set core-dump enable
- B . set core-dump total
- C . set user-dump enable
- D . set core-dump per_process