Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Checkpoint CCTE 156-587 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam 156-587 Premium Access

View all detail and faqs for the 156-587 exam


433 Students Passed

96% Average Score

96% Same Questions
Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions
Questions # 1:

When a User Mode process suddenly crashes, it may create a core dump file. Which of the following information is available in the core dump and may be used to identify the root cause of the crash?

i. Program Counter

ii. Stack Pointer

iii. Memory management information

iv. Other Processor and OS flags / information

Options:

A.

iii and iv only

B.

i and ii only

C.

i, ii, iii and iv

D.

Only lii

Questions # 2:

You want to fully investigate the VPN establishment, what will you do?

Options:

A.

vpn debug and use IKEview

B.

debug FWD because VPND Is child process

C.

use vpn tu command and use option 8 to start debug

D.

use kernel debug with fw ctl debug -m VPN all

Questions # 3:

After kernel debug with “fw ctl debug you received a huge amount of information It was saved in a very large file that is difficult to open and analyze with standard text editors Suggest a solution to

solve this issue

Options:

A.

Reduce debug buffer to 1024KB and run debug for several times

B.

Use Check Point InfoView utility to analyze debug output

C.

Use “fw ctl zdebug because of 1024KB buffer size

D.

Divide debug information into smaller files. Use “ fw ctl kdebug -f -o “filename -m 25 - s ‘’1024’’

Questions # 4:

What is the kernel process for Content Awareness that collects the data from the contexts received from the CMI and decides if the file is matched by a data type?

Options:

A.

cntawmod

B.

cntmgr

C.

dlpda

D.

dlpu

Questions # 5:

Packet processing infrastructure consists of the following components EXCEPT:

Options:

A.

Observers

B.

Manager

C.

Client

D.

Classifiers

Questions # 6:

What command is usually used for general firewall kernel debugging and what is the size of the buffer that is automatically enabled when using the command?

Options:

A.

fw ctl debug, buffer size is 1024 KB

B.

fw ctl zdebug, buffer size is 1 MB

C.

fw ctl kdebug, buffer size is 32000 KB

D.

fw ctl zdebug, buffer size is 32768 KB

Questions # 7:

What are the three main component of Identity Awareness?

Options:

A.

Client, SMS and Secure Gateway

B.

Identity Source Identity Server (POP) and Identity Enforcement (PEP)

C.

Identity Awareness Blade on Security Gateway, User Database on Security Management Server and Active Directory

D.

User, Active Directory and Access Role

Questions # 8:

What is the correct syntax to set all debug flags for Unified Policy related issues?

Options:

A.

fw ctl kdebug-m UP all

B.

fw ctl debug-m UP all

C.

fw ctl debug -m up all

D.

fw ctl debug -m fw all

Questions # 9:

What process monitors terminates, and restarts critical Check Point processes as necessary?

Options:

A.

CPM

B.

FWD

C.

CPWD

D.

FWM

Questions # 10:

Which of the following is a component of the Context Management Infrastructure used to collect signatures in user space from multiple sources such as Application Control and IPS. and compiles them together into unified Pattern Matchers?

Options:

A.

Context Loader

B.

PSL - Passive Signature Loader

C.

cpas

D.

CMI Loader

Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.