CheckPoint Check Point Certified Troubleshooting Expert - R81 156-586 Exam Questions

Page: 1 / 14
Total 75 questions
Question 1

During firewall kernel debug with fw ctl zdebug you received less information that expected. You noticed that a lot of messages were lost since the time the debug was started. What should you do to resolve this issue?



Answer : A


Question 2

Which of these packet processing components stores Rule Base matching state-related information?



Answer : D


Question 3

The Check Point Firewall Kernel is the core component of the Gaia operating system and an integral part of traffic inspection process. There are two procedures available for debugging the firewall kernel. Which procedure/command is used for detailed troubleshooting and needs more resources?



Answer : D


Question 4

Which process is responsible for the generation of certificates?



Answer : D


Question 5

What is correct about the Resource Advisor (RAD) service on the Security Gateways?



Answer : D


Question 6

What is the kernel process for Content Awareness that collects the data from the contexts received from the CMI and decides if the file is matched by a data type?



Answer : A


Question 7

You are using the Identity Collector with Identity Awareness in large environment. Users report that they cannot access resources on Internet. You identify that the traffic is matching the cleanup rule instead of the proper rule with Access Roles using the IDC. How can you check if IDC is working?



Answer : D


Page:    1 / 14   
Total 75 questions