Check Point 156-585 Check Point Certified Troubleshooting Expert Online Training
Check Point 156-585 Online Training
The questions for 156-585 were last updated at Nov 22,2024.
- Exam Code: 156-585
- Exam Name: Check Point Certified Troubleshooting Expert
- Certification Provider: Check Point
- Latest update: Nov 22,2024
Which Threat Prevention daemon is the core Threat Emulator, engine and responsible for emulation files and communications with Threat Cloud?
- A . ctasd
- B . inmsd
- C . ted
- D . scrub
The management configuration stored in the Postgres database is partitioned into several relational database Domains, like – System, User, Global and Log Domains. The User Domain stores the network objects and security policies.
Which of the following is stored in the Log Domain?
- A . Configuration data of Log Servers and saved queries for applications
- B . Active Logs received from Security Gateways and Management Servers
- C . Active and past logs received from Gateways and Servers
- D . Log Domain is not stored in Postgres database, it is part of Solr indexer only
Which process is responsible for the generation of certificates?
- A . cpm
- B . cpca
- C . dbsync
- D . fwm
the difference in debugging a S2S or C2S (using Check Point VPN Client) VPN?
- A . there is no difference
- B . the C2S VPN uses a different VPN daemon and there a second VPN debug
- C . the C2S VPN can not be debugged as it uses different protocols for the key exchange
- D . the C2S client uses Browser based SSL vpn and can’t be debugged
The two procedures available for debugging in the firewall kernel are
i fw ctl zdebug
ii fw ctl debug/kdebug
Choose the correct statement explaining the differences in the two
- A . (i) Is used for general debugging, has a small buffer and is a quick way to set kernel debug flags to get an output via command line whereas (11) is useful when there is a need for detailed debugging and requires additional steps to set the buffer and get an output via command line
- B . (i) is used to debug the access control policy only, however (n) can be used to debug a unified policy
- C . (i) is used to debug only issues related to dropping of traffic, however (n) can be used for any firewall issue including NATing, clustering etc.
- D . (i) is used on a Security Gateway, whereas (11) is used on a Security Management Server
When a User Mode process suddenly crashes it may create a core dump file.
Which of the following information is available in the core dump and may be used to identify the root cause of the crash?
i Program Counter
ii Stack Pointer
ii. Memory management information
iv Other Processor and OS flags / information
- A . i, ii, lii and iv
- B . i and n only
- C . iii and iv only
- D . D Only iii
What is the buffer size set by the fw ctl zdebug command?
- A . 1 MB
- B . 1 GB
- C . 8MB
- D . 8GB
You have configured IPS Bypass Under Load function with additional kernel parameters ids_tolerance_no_stress=15 and ids_tolerance_stress-15 For configuration you used the *fw ctl set’ command After reboot you noticed that these parameters returned to their default values.
What do you need to do to make this configuration work immediately and stay permanent?
- A . Set these parameters again with “fw ctl set” and edit appropriate parameters in $FWDIR/boot/modules/ fwkern.conf
- B . Use script $FWDIR/bin IpsSetBypass.sh to set these parameters
- C . Set these parameters again with “fw ctl set” and save configuration with “save config”
- D . Edit appropriate parameters in $FWDIR/boot/modules/fwkern.conf
What are some measures you can take to prevent IPS false positives?
- A . Exclude problematic services from being protected by IPS (sip, H 323, etc )
- B . Use IPS only in Detect mode
- C . Use Recommended IPS profile
- D . Capture packets. Update the IPS database, and Back up custom IPS files
What is the function of the Core Dump Manager utility?
- A . To generate a new core dump for analysis
- B . To limit the number of core dump files per process as well as the total amount of disk space used by core files
- C . To determine which process is slowing down the system
- D . To send crash information to an external analyzer
Question 30: the exact answer is the Fisrt option, not the Fourth
Question 30: The correct command is “clish” not “dish”
Question 27. the tirdh answer is “-D” not “-O”