CheckPoint 156-585 Check Point Certified Troubleshooting Expert Exam Practice Test

Page: 1 / 14
Total 114 questions
Question 1

Which Threat Prevention Daemon is the core Threat Emulation engine and responsible for emulation files and communications with Threat Cloud?



Answer : C


Question 2

Your users have some issues connecting Mobile Access VPN to the gateway. How can you debug the tunnel establishment?



Answer : A


Question 3

What file contains the RAD proxy settings?



Answer : A


Question 4

What acceleration mode utilizes multi-core processing to assist with traffic processing?



Answer : C


Question 5

The Check Point Firewall Kernel is the core component of the Gala operating system and an integral part of traffic inspection process. There are two procedures available for debugging the firewall kernel. Which procedure/command is used for detailed troubleshooting and needs more resources?



Answer : B


Question 6

When debugging is enabled on firewall kernel module using the 'fw ctl debug' command with required options, many debug messages are provided by the kernel that help the administrator to identify issues. Which of the following is true about these debug messages generated by the kernel module?



Answer : B


Question 7

An administrator receives reports about issues with log indexing and text searching regarding an existing Management Server. In trying to find a solution she wants to check if the process responsible for this feature is running correctly. What is true about the related process?



Answer : D


Page:    1 / 14   
Total 114 questions