Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

156-587 Questions and Answers

Question # 6

What command is used to find out which port Multi-Portal has assigned to the Mobile Access Portal?

A.

mpcient getdata sslvpn

B.

netstat -nap | grep mobile

C.

netstat getdata sslvpn

D.

mpclient getdata mobi

Full Access
Question # 7

You need to run a kernel debug over a longer period of time as the problem occurs only once or twice a week. Therefore you need to add a timestamp to the kernel debug and write the output to a file

but you cant afford to fill up all the remaining disk space and you only have 10 GB free for saving the debugs What is the correct syntax for this?

A.

A fw ctl kdebug -T -f -m 10 -s 1000000 -o debugfilename

B.

fw ctl debug -T -f-m 10 -s 1000000 -o debugfilename

C.

fw ctl kdebug -T -f -m 10 -s 1000000 > debugfilename

D.

fw ctl kdebug -T -m 10 -s 1000000 -o debugfilename

Full Access
Question # 8

Troubleshooting issues with Mobile Access requires the following:

A.

'ma_vpnd' process on Security Gateway

B.

Debug logs of FWD captured with the command - ‘fw debug fwd on TDERROR_MOBILE_ACCESS=5'

C.

Standard VPN debugs, packet captures and debugs of cvpnd1 process on Security Gateway

D.

Standard VPN debugs and packet captures on Security Gateway, debugs of 'cvpnd' process on Security Management

Full Access
Question # 9

What process monitors terminates, and restarts critical Check Point processes as necessary?

A.

CPM

B.

FWD

C.

CPWD

D.

FWM

Full Access
Question # 10

What is correct about the Resource Advisor (RAD) service on the Security Gateways?

A.

RAD is not a separate module, it is an integrated function of the ‘fw’ kernel module and does all operations in the kernel space

B.

RAD functions completely in user space The Pattern Matter (PM) module of the CMI looks up for URLs in the cache and if not found, contact the RAD process in user space to do online categorization

C.

RAD is completely loaded as a kernel module that looks up URL in cache and if not found connects online for categorization There is no user space involvement in this process

D.

RAD has a kernel module that looks up the kernel cache notifies client about hits and misses and forwards a-sync requests to RAD user space module which is responsible for online categorization

Full Access
Question # 11

What version of Check Point can Security Gateways begin dynamically distributing Logs between log servers?

A.

R81

B.

R77

C.

R30

D.

R75

Full Access
Question # 12

Check Point provides tools & commands to help you to identify issues about products and applications. Which Check Point command can help you to display status and statistics information for various Check Point products and applications?

A.

CPview

B.

cpstat

C.

fwstat

D.

CPstat

Full Access
Question # 13

What command(s) will turn off all vpn debug collection?

A.

vpn debug -a off

B.

fw ctl debug 0

C.

vpn debug off

D.

vpn debug off and vpn debug Ikeoff

Full Access
Question # 14

Captive Portal, PDP and PEP run in what space?

A.

User

B.

CPM

C.

FWD

D.

Kernel

Full Access
Question # 15

When a User process or program suddenly crashes, a core dump is often used to examine the problem Which command is used to enable the core-dumping via GAIA clish?

A.

set core-dump enable

B.

set core-dump total

C.

set user-dump enable

D.

set core-dump per_process

Full Access
Question # 16

VPNs allow traffic to pass through the Internet securely by encrypting the traffic as it enters the VPN tunnel and decrypting the traffic as it exits. Which process is responsible for Mobile VPN connections?

A.

cvpnd

B.

fwk

C.

vpnd

D.

vpnk

Full Access
Question # 17

When a user space process or program suddenly crashes, what type of file is created for analysis

A.

core dump

B.

kernel_memory_dump dbg

C.

core analyzer

D.

coredebug

Full Access
Question # 18

You do not see logs in the SMS. When you login on the SMS shell and run cpwd_admin list you notice that the RFL process is with status T. What command can you run to try to resolve it?

A.

RFLstop and RFLstart

B.

evstart and evstop

C.

smartlog_server stop and smartlog_server restart

D.

rflsop and rflstart

Full Access
Question # 19

Where will the usermode core files located?

A.

$FWDIRVar/log/dump/usermode

B.

/var/suroot

C.

/var/log/dump/usermode

D.

$CPDIR/var/log/dump/usermode

Full Access
Question # 20

Which two files contain the Application Database on the Security Gateway?

A.

api_db.C and api_custom_db.C

B.

apcl_db.C and apd_custom_db.C

C.

application_db.C and application_custom_db.C

D.

appi_db.C and appi_custom_db.C

Full Access
Question # 21

Check Point Access Control Daemons contains several daemons for Software Blades and features. Which Daemon is used for Application & Control URL Filtering?

A.

pdpd

B.

rad

C.

cprad

D.

pepd

Full Access
Question # 22

What is the name of the VPN kernel process?

A.

VPND

B.

CVPND

C.

FWK

D.

VPNK

Full Access
Question # 23

What information does the doctor-log script supply?

A.

Logging errors. Exceptions, Repair options

B.

Current and daily average logging rates. Indexing status, Size

C.

Logging rates, Logging Directories, List of troubleshooting tips

D.

Repair options. Logging Rates, Logging Directories

Full Access
Question # 24

Which of the following inputs is suitable for debugging HTTPS inspection issues?

A.

fw debug tls on TDERROR_ALL_ALL=5

B.

fw ctl debug -m fw + conn drop cptls

C.

vpn debug cptls on

D.

fw diag debug tls enable

Full Access
Question # 25

Where do you enable log indexing on the SMS?

A.

SMS object under "Other"

B.

SMS object under "Advanced"

C.

SMS object under "Logs"

D.

SMS object under "General Properties"

Full Access
Question # 26

In some scenarios it is very helpful to use advanced Linux commands for troubleshooting purposes. Which command displays information about resource utilization for running processes and shows additional information for core utilization and memory?

A.

top

B.

vmstat

C.

cptop

D.

mpstat

Full Access
Question # 27

URL Filtering is an essential part of Web Security in the Gateway. For the Security Gateway to perform a URL lookup when a client makes a URL request, where is the sync-request forwarded from if a sync-request is required?

A.

URLF Kernel Client

B.

RAD User Space

C.

RAD Kernel Space

D.

URLF Online Service

Full Access
Question # 28

Like a Site-to-Site VPN between two Security Gateways, a Remote Access VPN relies on the Internet Key Exchange (IKE) what types of keys are generated by IKE during negotiation?

A.

Produce a symmetric key on both sides

B.

Produce an asymmetric key on both sides

C.

Symmetric keys based on pre-shared secret

D.

Produce a pair of public and private keys

Full Access
Question # 29

The management configuration stored in the Postgres database is partitioned into several relational database domains. What is the purpose of the Global Domain?

A.

Global Domains is used by the IPS software blade to map the IDs to the corresponding countries according to the IpToCountry.csv file.

B.

This domain is used as the global database to back up the objects referencing the corresponding object attributes from the System Domain.

C.

This domain is used as the global database to track the changes made by multiple administrators on the same objects prior to publishing.

D.

This domain is used as the global database for MDSM and contains global objects and policies.

Full Access
Question # 30

You receive reports from multiple users that they cannot browse Upon further discovery you identify that Identity Awareness cannot identify the users properly and apply the configuredAccess Roles

What commands you can use to troubleshoot all identity collectors and identity providers from the command line?

A.

on the gateway: pdp debug set IDC all IDP all

B.

on the gateway: pdp debug set AD all and IDC all

C.

on the management: pdp debug on IDC all

D.

on the management: pdp debug set all

Full Access
Question # 31

What are the main components of Check Point’s Security Management architecture?

A.

Management server, Log server, Gateway server. Security server

B.

Management server, management database, log server, automation server

C.

Management server. Security Gateway. Multi-Domain Server. SmartEvent Server

D.

Management server. Log Server, LDAP Server, Web Server

Full Access
Question # 32

Your users are having trouble opening a Web page and you need to troubleshoot it. You open the Smart Console, and you get the following message when you navigate to the Logs and Monitor "SmartLog is not active or Failed to parse results from server". What is the first thing you can try to resolve it?

A.

Run the commands on the SMS: smartlogstart and smartlogstop

B.

smartlog debug on and smartlog debug off

C.

smartlog_server restart

D.

cpmstop and cpmstart

Full Access