Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

156-587 Exam Dumps - Check Point Certified Troubleshooting Expert - R81.20 (CCTE)

Go to page:
Question # 9

What is the most efficient way to read an IKEv2 Debug?

A.

IKEview

B.

vi on the cti

C.

notepad++

D.

any xml editor

Full Access
Question # 10

What is the correct syntax to turn a VPN debug on and create new empty debug files'?

A.

vpndebug trunc on

B.

vpn debug truncon

C.

vpn debug trunkon

D.

vpn kdebug on

Full Access
Question # 11

What clicommand is run on the GW to verifycommunication to the identity Collector?

A.

pdp connections idc

B.

pep connections idc

C.

show idc connections

D.

fwd connected

Full Access
Question # 12

What command is used to find out which port Multi-Portal has assigned to the Mobile Access Portal?

A.

mpcient getdata sslvpn

B.

netstat -nap | grep mobile

C.

netstat getdata sslvpn

D.

mpclient getdata mobi

Full Access
Question # 13

Captive Portal,PDP and PEP run in what space?

A.

User

B.

CPM

C.

FWD

D.

Kernel

Full Access
Question # 14

What is correct about the Resource Advisor (RAD) service on the Security Gateways?

A.

RAD is not a separate module, it is an integrated function of the‘fw’kernel module and does all operations in the kernel space

B.

RAD functions completely in user space The Pattern Matter (PM) module of the CMI looks up for URLs in the cache and if not found, contact the RAD process in user space to do onlinecategorization

C.

RAD is completely loaded as a kernel module that looks up URL in cache and if not found connects online for categorization There is no user space involvement in this process

D.

RAD has a kernel module that looks up the kernel cache notifies client about hits and misses and forwards a-sync requests to RAD user space modulewhich is responsible for onlinecategorization

Full Access
Question # 15

The Check Point Firewall Kernel is the core component of the Gaia operating system and an integral part ofthe traffic inspection process.There are two procedures available for debugging the firewall kernel.Which procedure/command is used for troubleshooting packet drops and other kernel activities while using minimal resources (1 MB buffer)?

A.

fw ctl zdebug

B.

fwk ell debug

C.

fw debug ctl

D.

fw ctl debug/kdebug

Full Access
Question # 16

When a User Mode process suddenly crashes,it may create a core dump file.Which of the following information is available in the core dump and may be used to identify the root cause of the crash?

i. Program Counter

ii. Stack Pointer

iii. Memory management information

iv. Other Processor and OS flags / information

A.

iii and iv only

B.

i and ii only

C.

i, ii, iii and iv

D.

Only lii

Full Access
Go to page: