March Sale Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

Note! 156-585 has been withdrawn. The new exam code is 156-586

156-585 Check Point Certified Troubleshooting Expert Questions and Answers

Question # 6

What is the difference in debugging a S2S or C2S (using Check Point VPN Client) VPN?

A.

there is no difference

B.

the C2S VPN uses a different VPN daemon and there a second VPN debug

C.

the C2S VPN can not be debugged as it uses different protocols for the key exchange

D.

the C2S client uses Browser based SSL vpn and can’t be debugged

Full Access
Question # 7

PostgreSQL is a powerful, open source relational database management system Check Point offers a command for viewing the database to interact with Postgres interactive shell Which command do you need to enter the PostgreSQL interactive shell?

A.

psql_client cpm postgres

B.

mysql_client cpm postgres

C.

psql_c!ieni postgres cpm

D.

mysql -u root

Full Access
Question # 8

What is the purpose of the Hardware Diagnostics Tool?

A.

Verifying that Check Point Appliance hardware is functioning correctly

B.

Verifying the Security Management Server hardware is functioning correctly

C.

Verifying that Security Gateway hardware is functioning correctly

D.

Verifying that Check Point Appliance hardware is actually broken

Full Access
Question # 9

Which process is responsible for the generation of certificates?

A.

cpm

B.

cpca

C.

dbsync

D.

fwm

Full Access
Question # 10

Which Threat Prevention Daemon is the core Threat Emulation engine and responsible for emulation files and communications with Threat Cloud?

A.

ctasd

B.

in.msd

C.

ted

D.

scrub

Full Access
Question # 11

Your users have some issues connecting Mobile Access VPN to the gateway. How can you debug the tunnel establishment?

A.

in the file $CVPNDIR/conf/httpd.conf change the line loglevel .. To LogLevel debug and run cvpnrestart

B.

run vpn debug truncon

C.

run fw ctl zdebug -m sslvpn all

D.

in the file $VPNDIR/conf/httpd.conf the line Loglevel .. To LogLevel debug and run vpn restart

Full Access
Question # 12

What are the main components of Check Point's Security Management architecture?

A.

Management server, management database, log server, automation server

B.

Management server, Security Gateway. Multi-Domain Server, SmartEvent Server

C.

Management Server. Log Server. LDAP Server, Web Server

D.

Management server Log server, Gateway server. Security server

Full Access
Question # 13

What is the kernel process for Content Awareness that collects the data from the contexts received from the CMI and decides if the file is matched by a data type?

A.

dlpda

B.

dlpu

C.

cntmgr

D.

cntawmod

Full Access
Question # 14

During firewall kernel debug with fw ctl zdebug you received less information than expected. You noticed that a lot of messages were lost since the time the debug was started. What should you do to resolve this issue?

A.

Increase debug buffer; Use fw ctl debug –buf 32768

B.

Redirect debug output to file; Use fw ctl zdebug –o ./debug.elg

C.

Increase debug buffer; Use fw ctl zdebug –buf 32768

D.

Redirect debug output to file; Use fw ctl debug –o ./debug.elg

Full Access
Question # 15

Where do Protocol parsers register themselves for IPS?

A.

Passive Streaming Library

B.

Other handlers register to Protocol parser

C.

Protections database

D.

Context Management Infrastructure

Full Access
Question # 16

John has renewed his NGTX License but he gets an error (contract for Anti-Bot expired). He wants to check the subscription status on the CU of the gateway, what command can he use for this?

A.

cpstat antimalware -f subscription_status

B.

fw monitor license status

C.

fwm lie print

D.

show license status

Full Access
Question # 17

What is the buffer size set by the fw ctl zdebug command?

A.

1 MB

B.

1 GB

C.

8MB

D.

8GB

Full Access