0% found this document useful (0 votes)
261 views7 pages

Check Point 156-585 Exam Study Guide

This document provides a study guide for Check Point's 156-585 Certified Troubleshooting Expert exam, with questions and answers on Check Point firewall configuration and troubleshooting topics. It covers commands for checking Multi-Portal port assignments, dropped packet monitoring, firewall acceleration table information, Content Awareness processes, IPS protocol registration, and absolute firewall chain position insertion.

Uploaded by

Michel WA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
261 views7 pages

Check Point 156-585 Exam Study Guide

This document provides a study guide for Check Point's 156-585 Certified Troubleshooting Expert exam, with questions and answers on Check Point firewall configuration and troubleshooting topics. It covers commands for checking Multi-Portal port assignments, dropped packet monitoring, firewall acceleration table information, Content Awareness processes, IPS protocol registration, and absolute firewall chain position insertion.

Uploaded by

Michel WA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

m

er as
co
eH w
o.
rs e
ou urc
o
aC s
vi y re
ed d
ar stu

156-585 Free Questions


Good Demo For Check Point 156-585
is

Exam
Th
sh

This study source was downloaded by 100000833464759 from CourseHero.com on 10-08-2021 12:39:13 GMT -05:00

https://www.coursehero.com/file/107288295/Check-Point-Certified-Troubleshooting-Expert-CCTE-156-585-Study-Guide-2021-9-24pdf/
1.What command is usedtofind out which port Multi-Portal has assigned to the Mobile
Access Portal?
A. mpclient getdata sslvpn
B. netstat -nap | grep mobile
C. mpclient getdata mobi
D. netstat getdata sslvpn
Answer: A

2.What is the simplest and most efficient way to check all dropped packets in real
time?
A. fw ctl zdebug * drop in expert mode
B. Smartlog

4
-2
C. cat /dev/fwTlog in expert mode

-9
21
D. tail -f SFWDIR/log/fw log |grep drop in expert mode

20
Answer: A

de

m
ui
er as
G
dy

co
tu
eH w S
3.What table does the command "fwaccel conns" pull information from?
5
58

o.
6-
A. fwxl_conns rs e 15

B. SecureXLCon
ou urc C
T
E

C. cphwd_db
C
t
er

D. sxl_connections
xp
o
E

Answer: C
ng
aC s ti
vi y re le
sh
oo
ub

4.What is the kernel process for Content Awareness that collects the data from the
ro
T

contexts received from the CMI and decides if the file is matched by a data type?
ed d ie
d

A. dlpda
ar stu
er
ti
f

B. dlpu
C
nt

C. cntmgr
oi
P
is
ck

D. cntawmod
he

Answer: A
Th C

sh

5.Where do Protocol parsers register themselves for IPS?


A. Passive Streaming Library
B. Other handlers register to Protocol parser
C. Protections database
D. Context Management Infrastructure
Answer: A

This study source was downloaded by 100000833464759 from CourseHero.com on 10-08-2021 12:39:13 GMT -05:00

https://www.coursehero.com/file/107288295/Check-Point-Certified-Troubleshooting-Expert-CCTE-156-585-Study-Guide-2021-9-24pdf/
6.Which command do you need to execute to insert fw monitor after TCP streaming
(out) in the outbound chain using absolute position? Given the chain was 1ffffe0,
choose the correct answer.
A. fw monitor Cpo -0x1ffffe0
B. fw monitor Cp0 ox1ffffe0
C. fw monitor Cpo 1ffffe0
D. fw monitor Cp0 Cox1ffffe0
Answer: A
Explanation:
https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_Per
formanceTuning_AdminGuide/Content/Topics-PTG/CLI/fw-monitor.htm

4
-2
7.What are the four ways to insert an FW Monitor into the firewallkernel chain?

-9
21
A. Relative position using location, relativepositionusing alias, absolute position, all

20
positions

de

m
ui
er as
B. Absolute position using location, absolute position using alias, relative position, all

G
dy

co
positions

tu
eH w S
C. Absolute position using location, relative position using alias, general position, all
5
58

o.
6-
positions rs e 15

D. Relative position using geolocation relative position using inertial navigation,


ou urc C
T
E

absolute position all positions


C
t
er

Answer: A
xp
o
E
ng
aC s ti
vi y re sh
oo

8.Rules within the Threat Prevention policy use the Malware database and network
le
ub

objects.
ro
T

Which directory is used for the Malware database?


ed d ie
d

A. $FWDIR/conf/install_manager_tmp/ANTIMALWARE/conf/
ar stu
er
ti
f

B. $CPDIR/conf/install_manager_lmp/ANTIMALWARE/conf/
C
nt

C. $FWDlR/conf/install_firewall_imp/ANTIMALWARE/conf/
oi
P
is
ck

D. $FWDlR/log/install_manager_tmp/ANTIMALWARBlog?
he

Answer: A
Th C

sh

9.Check Point's PostgreSQL is partitioned into several relational database domains.


Which domain contains network objects and security policies?
A. User Domain
B. System Domain
C. Global Domain
D. Log Domain
Answer: A

This study source was downloaded by 100000833464759 from CourseHero.com on 10-08-2021 12:39:13 GMT -05:00

https://www.coursehero.com/file/107288295/Check-Point-Certified-Troubleshooting-Expert-CCTE-156-585-Study-Guide-2021-9-24pdf/
10.During firewall kernel debug with fw ctl zdebug you received less information than
expected. You noticed that a lot of messages were lost since the time the debug was
started.
What should you do to resolve this issue?
A. Increase debug buffer; Use fw ctl debug Cbuf 32768
B. Redirect debug output to file; Use fw ctl zdebug Co ./debug.elg
C. Increase debug buffer; Use fw ctl zdebug Cbuf 32768
D. Redirect debug output to file; Use fw ctl debug Co ./debug.elg
Answer: A
Explanation:
Reference: https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_
R80.40_PerformanceTuning_AdminGuide/Content/Topics-PTG/Kernel-Debug/Kernel-

4
-2
Debug- Procedure.htm

-9
21
20
de

m
ui
er as
11.What command sets a specific interface as not accelerated?

G
dy

co
A. noaccel-s<interface1>

tu
eH w S
B. fwaccel exempt state <interface1>
5
58

o.
6-
C. nonaccel -s <interface1> rs e 15

D. fwaccel -n <intetface1 >


ou urc C
T
E

Answer: C
C
t
er
xp
o
E
ng
aC s ti

12.Which Threat Prevention daemon is the core Threat Emulator, engine and
vi y re sh
oo

responsible for emulation files and communications with Threat Cloud?


le
ub

A. ctasd
ro
T

B. inmsd
ed d ie
d

C. ted
ar stu
er
ti
f

D. scrub
C
nt

Answer: C
oi
P
is
ck

Explanation:
he

https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsol
Th C

utiondetails=&solutionid=sk97638
sh

13.The management configuration stored in the Postgres database is partitioned into


several relational database Domains, like - System, User, Global and Log Domains.
The User Domain stores the network objects and security policies.
Which of the following is stored in the Log Domain?
A. Configuration data of Log Servers and saved queries for applications
B. Active Logs received from Security Gateways and Management Servers
C. Active and past logs received from Gateways and Servers
This study source was downloaded by 100000833464759 from CourseHero.com on 10-08-2021 12:39:13 GMT -05:00

https://www.coursehero.com/file/107288295/Check-Point-Certified-Troubleshooting-Expert-CCTE-156-585-Study-Guide-2021-9-24pdf/
D. Log Domain is not stored in Postgres database, it is part of Solr indexer only
Answer: A

14.Which process is responsible for the generation of certificates?


A. cpm
B. cpca
C. dbsync
D. fwm
Answer: B

15.the difference in debugging a S2S or C2S (using Check Point VPN Client) VPN?

4
-2
A. there is no difference

-9
21
B. the C2S VPN uses a different VPN deamon and there a second VPN debug

20
C. the C2S VPN can not be debugged as it uses different protocols for the key

de

m
ui
er as
exchange

G
dy

co
D. the C2S client uses Browser based SSL vpn and cant be debugged

tu
eH w S
Answer: A
5
58

o.
6-
rs e 15
ou urc C
T
E

16.The two procedures available for debugging in the firewall kernel are
C
t
er

i fw ctl zdebug
xp
o
E

ii fw ctl debug/kdebug
ng
aC s ti

Choose the correct statement explaining the differences in the two


vi y re sh
oo

A. (i) Is used for general debugging, has a small buffer and is a quick way to set
le
ub

kernel debug flags to get an output via command line whereas (11) is useful when
ro
T

there is a need for detailed debugging and requires additional steps to set the buffer
ed d ie
d

and get an output via command line


ar stu
er
ti
f

B. (i) is used to debug the access control policy only, however (n) can be used to
C
nt

debug a unified policy


oi
P
is
ck

C. (i) is used to debug only issues related to dropping of traffic, however (n) can be
he

used for any firewall issue including NATing, clustering etc.


Th C

D. (i) is used on a Security Gateway, whereas (11) is used on a Security Management


Server
sh

Answer: A

17.When a User Mode process suddenly crashes it may create a core dump file.
Which of the following information is available in the core dump and may be used to
identify the root cause of the crash?
i Program Counter
ii Stack Pointer
This study source was downloaded by 100000833464759 from CourseHero.com on 10-08-2021 12:39:13 GMT -05:00

https://www.coursehero.com/file/107288295/Check-Point-Certified-Troubleshooting-Expert-CCTE-156-585-Study-Guide-2021-9-24pdf/
ii. Memory management information
iv Other Processor and OS flags / information
A. i, ii, lii and iv
B. i and n only
C. iii and iv only
D. D Only iii
Answer: A

18.What is the buffer size set by the fw ctl zdebug command?


A. 1 MB
B. 1 GB
C. 8MB

4
-2
D. 8GB

-9
21
Answer: A

20
de

m
ui
er as
G
dy

co
19.You have configured IPS Bypass Under Load function with additional kernel

tu
eH w S
parameters ids_tolerance_no_stress=15 and ids_tolerance_stress-15 For
5
58

o.
6-
configuration you used the *fw ctl set' command After reboot you noticed that these
rs e 15

parameters returned to their default values.


ou urc C
T
E

What do you need to do to make this configuration work immediately and stay
C
t
er

permanent?
xp
o
E

A. Set these parameters again with “fw ctl set” and edit appropriate parameters in
ng
aC s ti

$FWDIR/boot/modules/ fwkern.conf
vi y re sh
oo

B. Use script $FWDIR/bin IpsSetBypass.sh to set these parameters


le
ub

C. Set these parameters again with “fw ctl set” and save configuration with “save
ro
T

config”
ed d ie
d

D. Edit appropriate parameters in $FWDIR/boot/modules/fwkern.conf


ar stu
er
ti
f

Answer: A
C
nt

Explanation:
oi
P
is
ck

https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsol
he

utiondetails=&solutionid=sk62848&partition=Advanced&product=IPS
Th C

sh

20.What are some measures you can take to prevent IPS false positives?
A. Exclude problematic services from being protected by IPS (sip, H 323, etc )
B. Use IPS only in Detect mode
C. Use Recommended IPS profile
D. Capture packets. Update the IPS database, and Back up custom IPS files
Answer: D

This study source was downloaded by 100000833464759 from CourseHero.com on 10-08-2021 12:39:13 GMT -05:00

https://www.coursehero.com/file/107288295/Check-Point-Certified-Troubleshooting-Expert-CCTE-156-585-Study-Guide-2021-9-24pdf/
m
er as
co
eH w
o.
rs e
ou urc
o
aC s
vi y re
ed d

Go To 156-585 Exam
ar stu

Questions Full Version


is
Th
sh

This study source was downloaded by 100000833464759 from CourseHero.com on 10-08-2021 12:39:13 GMT -05:00

https://www.coursehero.com/file/107288295/Check-Point-Certified-Troubleshooting-Expert-CCTE-156-585-Study-Guide-2021-9-24pdf/
Powered by TCPDF (www.tcpdf.org)

You might also like