How many different types of Service Requests exist?
Answer : A
Check Point categorizes Service Requests (SRs) into four main types: Technical Support, Product Enhancement, Billing and Licensing, and Other Services. Each type caters to different aspects of customer needs, ensuring that users can address a wide range of issues and requests through the appropriate channels.
UserCenter/PartnerMAP access is based on what criteria?
Answer : B
Access to UserCenter and PartnerMAP is primarily based on the user permissions assigned to company contacts. These permissions dictate what information and functionalities users can access within the portals, ensuring that only authorized personnel can view or manage specific aspects of the Check Point services and products.
Which of the following allows you to capture packets at four inspection points as they traverse a Check Point gateway?
Answer : D
The fw monitor tool allows packet capture at multiple inspection points within a Check Point gateway, typically four in total. This capability provides comprehensive visibility into how packets are processed as they move through different stages of the firewall's inspection chain, facilitating effective troubleshooting and analysis.
Which of the following is NOT a way to insert fw monitor into the chain when troubleshooting packets throughout the chain?
Answer : D
When using fw monitor for packet capture in Check Point environments, packets can be monitored at various points in the inspection chain. The insertion methods include specifying a relative position using an identifier (id), using an absolute position, or specifying the position based on location within the chain. However, using an alias to determine the relative position is not a recognized method for inserting fw monitor into the inspection chain.
Check Point's self-service knowledge base of technical documents and tools covers everything from articles describing how to fix specific issues, understand error messages and to how to plan and perform product installation and upgrades. This knowledge base is called:
Answer : D
Check Point's self-service knowledge base is known as SecureKnowledge. It provides a comprehensive repository of technical documents, guides, troubleshooting steps, and tools necessary for managing and resolving issues related to Check Point products. The other options listed are either incorrect or do not represent the official name of Check Point's knowledge base.
Which of the following System Monitoring Commands (Linux) shows process resource utilization, as well as CPU and memory utilization?
Answer : D
The top command in Linux provides a real-time, dynamic view of system processes, showing CPU and memory usage among other metrics. It is the most suitable command for monitoring process resource utilization continuously. In contrast, df displays disk space usage, free shows memory usage, and ps provides a snapshot of current processes but without the dynamic, real-time monitoring that top offers.
You want to collect diagnostics data to include with an SR (Service Request). What command or utility best meets your needs?
Answer : B
The cpinfo command is designed to collect comprehensive diagnostic information from a Check Point gateway or management server. This data is essential when submitting a Service Request (SR) to Check Point Support, as it includes configuration details, logs, and system information. cpconfig is used for configuration, cpplic manages licenses, and contracts_mgmt handles contract management, none of which are specifically tailored for collecting diagnostic data for SRs.