Check Point 156-587 Practice Exams
Last updated on Apr 09,2025- Exam Code: 156-587
- Exam Name: Check Point Certified Troubleshooting Expert - R81.20 (CCTE)
- Certification Provider: Check Point
- Latest update: Apr 09,2025
Which of the following commands can be used to see the list of processes monitored by the Watch Dog process?
- A . cpstat fw -f watchdog
- B . fw ctl get str watchdog
- C . cpwd_admin list
- D . ps -ef | grep watchd
Your users have some issues connecting with Mobile Access VPN to your gateway.
How can you debug the tunnel establishment?
- A . run vpn debug truncon
- B . in the file $VPNDIR/conf/httpd conf change the line Loglevel To LogLevel debug and run vpn restart
- C . in the file SCVPNDIR/conf/httpd conf change the line Loglevel To LogLevel debug and run cvpnrestart
- D . run fw ctl zdebug -m sslvpn all
What is the proper command for allowing the system to create core files?
- A . service core-dump start
- B . SFWDIR/scripts/core-dump-enable.sh
- C . set core-dump enable
>save config - D . # set core-dump enable
# save config
What component is NOT part of Unified policy manager?
- A . Classifier
- B . CMI
- C . Handle
- D . Observer
Which of the following is contained in the System Domain of the Postgres database?
- A . Trusted GUI clients
- B . Configuration data of log servers
- C . Saved queries for applications
- D . User modified configurations such as network objects
When a user space process or program suddenly crashes, what type of file is created for analysis
- A . core dump
- B . kernel_memory_dump dbg
- C . core analyzer
- D . coredebug
In Mobile Access VPN. clientless access is done using a web browser. The primary communication path for these browser based connections is a process that allows numerous processes to utilize port 443 and redirects traffic to a designated port of the respective process.
Which daemon handles this?
- A . Multi-portal Daemon (MPD)
- B . Mobile Access Daemon (MAD)
- C . HTTPS Inspection Daemon (HID)
- D . Connectra VPN Daemon (cvpnd)
What command would you run to verify the communication between the Security Gateway and the Identity Collector?
- A . fw ctl debug -m IDAPI
- B . pdp connections idc
- C . fw ctl debug -m fw + nac
- D . adlog
The Check Point Firewall Kernel is the core component of the Gaia operating system and an integral part of traffic inspection process. There are two procedures available for debugging the firewall kernel.
Which procedure/command is used for detailed troubleshooting and needs more resources?
- A . fw ctl zdebug
- B . fw debug/kdebug
- C . fw ctl debug/kdebug
- D . fw debug/kdebug ctl
What is the kernel process for Content Awareness that collects the data from the contexts received from the CMI and decides if the file is matched by a data type?
- A . cntawmod
- B . cntmgr
- C . dlpda
- D . dlpu