Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

Note! 156-586 has been withdrawn. The new exam code is 156-587

156-586 Practice Exam Questions with Answers Check Point Certified Troubleshooting Expert - R81 (CCTE) Certification

Question # 6

What is the best way to resolve an issue caused by a frozen process?

A.

Kill the process

B.

Restart the process

C.

Reboot the machine

D.

Power off the machine

Full Access
Question # 7

Where will the usermode core files located?

A.

/var/log/dump/usermode

B.

$CPDIR/var/log/dump/usermode

C.

$FWDIR/var/log/dump/usermode

D.

/var/suroot

Full Access
Question # 8

What process monitors, terminates, and restarts critical Check Point processes as necessary?

A.

CPVVD

B.

CPM

C.

FWM

D.

FWD

Full Access
Question # 9

Your users are having trouble opening a Web page and you need to troubleshoot it. You open the Smart Console, and you get the following message when you navigate to the Logs and Monitor "SmartLog is not active or Failed to parse results from server". What is the first thing you can try to resolve it?

A.

Run the commands on the SMS: smartlogstart and smartlogstop

B.

smartlog debug on and smartlog debug off

C.

smartlog_server restart

D.

cpmstop and cpmstart

Full Access
Question # 10

An administrator receives reports about issues with log indexing and text searching regarding an existing Management Server. In trying to find a solution she wants to check if the process responsible for this feature is running correctly. What is true about the related process?

A.

cpd needs to be restarted manual to show in the list

B.

fwm manaqes this database after initialization of the 1CA

C.

solr is a child process of cpm

D.

fwssd crashes can affect therefore not show in the list

Full Access
Question # 11

What is the correct syntax to set all debug flags for Unified Policy related issues?

A.

fw ctl kdebug -m UP all

B.

fw ctl debug -m fw all

C.

fw ctl debug -m up all

D.

fw ctl debug -m UP all

Full Access
Question # 12

Which of the following inputs is suitable for debugging HTTPS inspection issues?

A.

fw debug tls on TDERROR_ALL_ALL=5

B.

fw ctl debug -m fw + conn drop cptls

C.

vpn debug cptls on

D.

fw diag debug tls enable

Full Access
Question # 13

URL Filtering is an essential part of Web Security in the Gateway. For the Security Gateway to perform a URL lookup when a client makes a URL request, where is the sync-request forwarded from if a sync-request is required?

A.

RAD User Space

B.

URLF Online Service

C.

URLF Kernel Client

D.

RAD Kernel Space

Full Access
Question # 14

The Check Point Firewall Kernel is the core component of the Gaia operating system and an integral part of traffic inspection process. There are two procedures available for debugging the firewall kernel. Which procedure/command is used for detailed troubleshooting and needs more resources?

A.

fw debug/kdebug

B.

fw ctl zdebug

C.

fw debug/kdebug ctl

D.

fw ctl debug/kdebug

Full Access
Question # 15

User defined URLS and HTTPS Inspection User defined URLs on the Security Gateway are stored in which database file?

A.

https_db.bin

B.

urlf_https.bin

C.

https_urlf.bin

D.

urlf_db.bin

Full Access
Question # 16

VPN issues may result from misconfiguration, communication failure, or incompatible default configurations between peers. Which basic command syntax needs to be used for troubleshooting Site-to-Site VPN issues?

A.

vpn truncon debuq

B.

cp debug truncon

C.

vpn debug truncon

D.

fw debug truncon

Full Access
Question # 17

When a User process or program suddenly crashes, a core dump is often used to examine the problem. Which command is used to enable the core-dumping via GAIA clish?

A.

set core-dump enable

B.

set core-dump per process

C.

set user-dump enable

D.

set core-dump total

Full Access
Question # 18

Which of the following is contained in the System Domain of the Postgres database?

A.

Trusted GUI clients

B.

Configuration data of log servers

C.

Saved queries for applications

D.

User modified configurations such as network objects

Full Access
Question # 19

When a User Mode process suddenly crashes, it may create a core dump file. Which of the following information is available in the core dump and may be used to identify the root cause of the crash?

i. Program Counter

ii. Stack Pointer

iii. Memory management information

iv. Other Processor and OS flags / information

A.

iii and iv only

B.

i, ii, iii and iv

C.

i and ii only

D.

Only iii

Full Access
Question # 20

Which of these packet processing components stores Rule Base matching state-related information?

A.

Observers

B.

Classifiers

C.

Manager

D.

Handlers

Full Access
Question # 21

What are the four main database domains?

A.

Local, Global, User, VPN

B.

System. Global. Log. Event

C.

System, User, Global. Log

D.

System, User, Host, Network

Full Access
Question # 22

You receive reports that Users cannot browse internet sites. You are using identity awareness with AD Query and Identity Collector in addition you have the Browser Based Authentication Enabled. What command can be used to debug the problem?

A.

on the gateway: ad debug on

B.

on the gateway: ad query debug on

C.

on the management: ad query debug extended

D.

on the gateway: pdp debug nac extended

Full Access