Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Checkpoint 156-587 - Check Point Certified Troubleshooting Expert - R81.20 (CCTE)

Page: 1 / 4
Total 109 questions

For Identity Awareness, what is the PDP process?

A.

Identity server

B.

Log Sifter

C.

Captive Portal Service

D.

UserAuth Database

Which of these packet processing components stores Rule Base matching state-related information?

A.

Classifiers

B.

Manager

C.

Handlers

D.

Observers

URL Filtering is an essential part of Web Security in the Gateway. For the Security Gateway to perform a URL lookup when a client makes a URL request, where is the sync-request forwarded from if a sync-request is required?

A.

URLF Kernel Client

B.

RAD User Space

C.

RAD Kernel Space

D.

URLF Online Service

What Check Point process controls logging?

A.

FWD

B.

CPVVD

C.

CPM

D.

CPD

What is the benefit of fw ctl debug over fw ctl zdebug?

A.

There is no difference Both are used for debugging kernel

B.

You don't need timestamps

C.

It allows you to debug multiple modules at the same time

D.

You only need 1MB buffer

Which of the following inputs is suitable for debugging HTTPS inspection issues?

A.

fw debug tls on TDERROR_ALL_ALL=5

B.

fw ctl debug -m fw + conn drop cptls

C.

vpn debug cptls on

D.

fw diag debug tls enable

The Check Point Firewall Kernel is the core component of the Gaia operating system and an integral part of traffic inspection process. There are two procedures available for debugging the firewall kernel. Which procedure/command is used for detailed troubleshooting and needs more resources?

A.

fw ctl zdebug

B.

fw debug/kdebug

C.

fw ctl debug/kdebug

D.

fw debug/kdebug ctl

How many packets are needed to establish IKEv1?

A.

Only three packets for main mode

B.

8

C.

5

D.

6

You are using the identity Collector with identity Awareness in large environment. Users report that they cannot access resources on Internet You identify that the traffic is matching the cleanup rule

Instead of the proper rule with Access Roles using the IDC How can you check if IDC is working?

A.

pdp connections idc

B.

ad query I debug on

C.

pep debug idc on

D.

pdp debug set IDP all

What function receives the AD log event information?

A.

FWD

B.

CPD

C.

PEP

D.

ADLOG