Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following 156-585 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is 156-587

156-585 Exam Dumps - Check Point Certified Troubleshooting Expert

Question # 4

Some users from your organization have been reported some connection problems with CIFS since this morning. You suspect an IPS Issue after an automatic IPS update last night. So you want to perform a packet capture on uppercase I only directly after the IPS module (position 4 in the chain) to check if the packets pass the IPS. What command do you need to run?

A.

fw monitor -ml -pl 5 -e

B.

fw monitor -pi 5 -e

C.

tcpdump -eni any

D.

fw monitor -pl asm

Full Access
Question # 5

Check Point provides tools & commands to help you to identify issues about products and applications. Which Check Point command can help you to display status and statistics information for various Check Point products and applications?

A.

cpstat

B.

CPstat

C.

CPview

D.

fwstat

Full Access
Question # 6

After kernel debug with "fw ctl debug" you received a huge amount of information It was saved in a very large file that is difficult to open and analyze with standard text editors Suggest a solution to solve this issue.

A.

Use "fw ctl zdebug' because of 1024KB buffer size

B.

Divide debug information into smaller files Use "fw ctl kdebug -f -o "filename" -m 25 - s "1024"

C.

Reduce debug buffer to 1024KB and run debug for several times

D.

Use Check Point InfoView utility to analyze debug output

Full Access
Question # 7

What is the most efficient way to view large fw monitor captures and run filters on the file?

A.

wireshark

B.

CLISH

C.

CLI

D.

snoop

Full Access
Question # 8

Rules within the Threat Prevention policy use the Malware database and network objects. Which directory is used for the Malware database?

A.

$FWDIR/conf/install_manager_tmp/ANTIMALWARE/conf/

B.

$CPDIR/conf/install_manager_lmp/ANTIMALWARE/conf/

C.

$FWDlR/conf/install_firewall_imp/ANTIMALWARE/conf/

D.

$FWDlR/log/install_manager_tmp/ANTIMALWARBlog?

Full Access
Question # 9

For TCP connections, when a packet arrives at the Firewall Kemel out of sequence or fragmented, which layer of IPS corrects this lo allow for proper inspection?

A.

Passive Streaming Library

B.

Protections

C.

Protocol Parsers

D.

Context Management

Full Access
Question # 10

For TCP connections, when a packet arrives at the Firewall Kernel out of sequence or fragmented, which layer of IPS corrects this to allow for proper inspection?

A.

Passive Streaming Library

B.

Protections

C.

Protocol Parsers

D.

Context Management

Full Access
Question # 11

Check Point Access Control Daemons contains several daemons for Software Blades and features Which Daemon is used for Application & Control URL Filtering?

A.

rad

B.

cprad

C.

pepd

D.

pdpd

Full Access
Question # 12

Which command can be run in Expert mode lo verify the core dump settings?

A.

grep cdm /config/db/coredump

B.

grep cdm /config/db/initial

C.

grep SFWDlR/config/db/initial

D.

cat /etc/sysconfig/coredump/cdm conf

Full Access
Question # 13

Which command is most useful for debugging the fwaccel module?

A.

fw zdebug

B.

securexl debug

C.

fwaccel dbg

D.

fw debug

Full Access
Question # 14

What table does command “fwaccel conns” pull information from?

A.

fwxl_conns

B.

SecureXLCon

C.

cphwd_db

D.

sxl_connections

Full Access
Question # 15

If you run the command "fw monitor -e accept src=10.1.1.201 or src=172.21.101.10 or src=192.0.2.10;" from the cli sh What will be captured?

A.

Packets from 10 1 1 201 going to 192.0 2.10

B.

Packets destined to 172 21 101 10 from 10.1.1.101

C.

Only packet going to 192.0.2.10

D.

fw monitor only works in expert mode so no packets will be captured

Full Access
Question # 16

James is using the same filter expression in fw monitor for CITRIX very often and instead of typing this all the time he wants to add it as a macro to the fw monitor definition file. What’s the name and location of this file?

A.

$FWDIR/lib/fwmonltor.def

B.

$FWDIR/conf/fwmonltor.def

C.

$FWDIR/lib/tcpip.def

D.

$FWDIR/lib/fw.monitor

Full Access
Question # 17

John works for ABC Corporation. They have enabled CoreXL on their firewall John would like to identify the cores on which the SND runs and the cores on which the firewall instance is running. Which command should John run to view the CPU role allocation?

A.

fw ctl affinity -v

B.

fwaccel stat -I

C.

fw ctl affinity -I

D.

fw ctl cores

Full Access