Check Point 156-586 Check Point Certified Troubleshooting Expert – R81 (CCTE) Online Training
Check Point 156-586 Online Training
The questions for 156-586 were last updated at Nov 19,2024.
- Exam Code: 156-586
- Exam Name: Check Point Certified Troubleshooting Expert - R81 (CCTE)
- Certification Provider: Check Point
- Latest update: Nov 19,2024
What is the Security Gateway directory where an administrator can find vpn debug log files generated during Site-to-Site VPN troubleshooting?
- A . /opt/CPsuiteR80/vpn/log/
- B . $FWDIR/conf/
- C . $FWDIR/log/
- D . $CPDIR/conf/
In Mobile Access VPN, clientless access is done using a web browser. The primary communication path for these browser based connections is a process that allows numerous processes to utilize port 443 and redirects traffic to a designated port of the respective process.
Which daemon handles this?
- A . Mobile Access Daemon (MAD)
- B . Connectra VPN Daemon (cvpnd)
- C . HTTPS Inspection Daemon (HID)
- D . Multi-portal Daemon
SmartEvent utilizes the Log Server, Correlation Unit and SmartEvent Server to aggregate logs and identify security events.
The three main processes that govern these SmartEvent components are:
- A . cpcu, cplog, cpse
- B . eventiasv, eventiarp,eventiacu
- C . cpsemd, cpsead, and DBSync
- D . fwd, secu, sesrv
During firewall kernel debug with fw ctl zdebug you received less information that expected. You noticed that a lot of messages were lost since the time the debug was started.
What should you do to resolve this issue?
- A . Increase debug buffer; Use fw ctl debug -buf 32768
- B . Redirect debug output to file; Use fw ctl debug -o ./debug.elg
- C . Redirect debug output to file; Use fw ctl zdebug -o ./debug.elg
- D . Increase debug buffer; Use fw ctl zdebug -buf 32768
Check Point Access Control Daemons contains several daemons for Software Blades and features.
Which Daemon is used for Application & Control URL Filtering?
- A . cprac
- B . rad
- C . pepd
- D . pdpd
What version of Check Point can Security Gateways begin dynamically distributing Logs between log servers?
- A . R81
- B . R77
- C . R30
- D . R75
In some scenarios it is very helpful to use advanced Linux commands for troubleshooting purposes.
Which command displays information about resource utilization for running processes and shows additional information for core utilization and memory?
- A . top
- B . vmstat
- C . cptop
- D . mpstat
What is the port for the Log Collection on Security Management Server?
- A . 253
- B . 443
- C . 18191
- D . 257
Troubleshooting issues with Mobile Access requires the following:
- A . Standard VPN debugs and packet captures on Security Gateway, debugs of ‘cvpnd’ process on Security Management
- B . Debug logs of FWD captured with the command – ‘fw debug fwd on TDERROR_MOBILE_ACCESS=5’
- C . ‘ma_vpnd’ process on Security Gateway
- D . Standard VPN debugs, packet captures, and debugs of ‘cvpnd’ process on Security Gateway