CheckPoint Check Point Certified Troubleshooting Expert - R81.20 156-587 Exam Questions

Page: 1 / 14
Total 109 questions
Question 1

When a User process or program suddenly crashes, a core dump is often used to examine the problem Which command is used to enable the core-dumping via GAIA clish?



Answer : A

In Check Point Gaia, you can enable core dumping through the command line interface (clish) using the following command:

set core-dump enable

This command activates the core dump mechanism, allowing the system to generate core dump files when user processes crash. Remember to save the configuration after enabling core dumps with the command:

save config

Why other options are incorrect:

B . set core-dump total: This command is used to set the total disk space limit for core dump files, not to enable core dumping itself.

C . set user-dump enable: There is no such command in Gaia clish for enabling core dumps.

D . set core-dump per_process: This command sets the maximum number of core dump files allowed per process, but it doesn't enable core dumping.

Check Point Troubleshooting Reference:

Check Point R81.20 Security Administration Guide: This guide provides comprehensive information about Gaia clish commands, including those related to system configuration and troubleshooting.

Check Point sk92764: This knowledge base article specifically addresses core dump management in Gaia, explaining how to enable and configure core dumps.

Enabling core dumps is a crucial step in troubleshooting process crashes as it provides valuable information for analysis and debugging.


Question 2
Question 3

What are the three main component of Identity Awareness?



Answer : B


Question 4

Which command is used to write a kernel debug to a file?



Answer : C


Question 5

What are the main components of Check Point's Security Management architecture?



Answer : B

The main components of Check Point's Security Management architecture are1:

Management server: This is the central component that manages the security policy, configuration, and licenses for the Security Gateways and other Check Point devices. It also provides the SmartConsole interface for the administrators to manage the security environment.

Management database: This is the database that stores the security policy, configuration, and objects for the Security Management Server. It also stores the logs and events from the Security Gateways and other Check Point devices.

Log server: This is the component that receives and stores the logs and events from the Security Gateways and other Check Point devices. It also provides the SmartLog and SmartEvent interfaces for the administrators to view, analyze, and manage the logs and events.

Automation server: This is the component that provides the REST API and the CLI for the administrators to automate and script the security management tasks.

1: (CCTE) - Check Point Software


Question 6

The Unified Access Control policy eliminates the need to maintain policies for different access control features However, you need to start a general debug of the Unified Policy with all flags turned on Which of the following is the correct syntax?



Answer : A


Question 7
Page:    1 / 14   
Total 109 questions