Weekend Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

156-587 Check Point Certified Troubleshooting Expert - R81.20 (CCTE) Questions and Answers

Questions 4

What tool would you run to diagnose logging and indexing?

Options:

A.

run cpm_doctor.sh

B.

cpstat mg -f log_server

C.

run diagnostic view

D.

run doctor-log.sh

Buy Now
Questions 5

What is the buffer size set by the fw ctl zdebug command?

Options:

A.

8GB

B.

1 MB

C.

1 GB

D.

8 MB

Buy Now
Questions 6

VPNs allow traffic to pass through the Internet securely by encrypting the traffic as it enters the VPN tunnel and decrypting the traffic as it exits. Which process is responsible for Mobile VPN connections?

Options:

A.

cvpnd

B.

fwk

C.

vpnd

D.

vpnk

Buy Now
Questions 7

What is the shorthand reference for a classification object?

Options:

A.

classobj

B.

CLOB

C.

COBJ

D.

class.obj

Buy Now
Questions 8

When a user space process or program suddenly crashes, what type of file is created for analysis

Options:

A.

core dump

B.

kernel_memory_dump dbg

C.

core analyzer

D.

coredebug

Buy Now
Questions 9

The management configuration stored in the Postgres database is partitioned into several relational database domains. What is the purpose of the Global Domain?

Options:

A.

Global Domains is used by the IPS software blade to map the IDs to the corresponding countries according to the IpToCountry.csv file.

B.

This domain is used as the global database to back up the objects referencing the corresponding object attributes from the System Domain.

C.

This domain is used as the global database to track the changes made by multiple administrators on the same objects prior to publishing.

D.

This domain is used as the global database for MDSM and contains global objects and policies.

Buy Now
Questions 10

What are the three main component of Identity Awareness?

Options:

A.

Client, SMS and Secure Gateway

B.

Identity Source Identity Server (POP) and Identity Enforcement (PEP)

C.

Identity Awareness Blade on Security Gateway, User Database on Security Management Server and Active Directory

D.

User, Active Directory and Access Role

Buy Now
Questions 11

What command(s) will turn off all vpn debug collection?

Options:

A.

vpn debug -a off

B.

fw ctl debug 0

C.

vpn debug off

D.

vpn debug off and vpn debug Ikeoff

Buy Now
Questions 12

You are using the identity Collector with identity Awareness in large environment. Users report that they cannot access resources on Internet You identify that the traffic is matching the cleanup rule

Instead of the proper rule with Access Roles using the IDC How can you check if IDC is working?

Options:

A.

pdp connections idc

B.

ad query I debug on

C.

pep debug idc on

D.

pdp debug set IDP all

Buy Now
Questions 13

Captive Portal, PDP and PEP run in what space?

Options:

A.

User

B.

CPM

C.

FWD

D.

Kernel

Buy Now
Questions 14

How does Identity Collector connect to Windows Server?

Options:

A.

ADQuery is needed for connection

B.

LDAP connection

C.

It uses a PDP demon to connect

D.

via Windows API

Buy Now
Questions 15

What components make up the Context Management Infrastructure?

Options:

A.

CPMI and FW Loader

B.

CPX and FWM

C.

CPM and SOLR

D.

CMI Loader and Pattern Matcher

Buy Now
Questions 16

Which of the following file is commonly associated with troubleshooting crashes on a system such as the Security Gateway?

Options:

A.

tcpdump

B.

core dump

C.

fw monitor

D.

CPMIL dump

Buy Now
Questions 17

You need to run a kernel debug over a longer period of time as the problem occurs only once or twice a week Therefore you need to add a timestamp to the kernel debug and write the output to a file. What is the correct syntax for this?

Options:

A.

fw ctl debug -T -f > filename debug

B.

fw ctl kdebug -T -f -o filename debug

C.

fw ell kdebug -T > filename debug

D.

fw ctl kdebug -T -f > filename.debug

Buy Now
Questions 18

What is the correct syntax to set all debug flags for Unified Policy related issues?

Options:

A.

fw ctl kdebug-m UP all

B.

fw ctl debug-m UP all

C.

fw ctl debug -m up all

D.

fw ctl debug -m fw all

Buy Now
Questions 19

What is the proper command for allowing the system to create core files?

Options:

A.

service core-dump start

B.

SFWDIR/scripts/core-dump-enable.sh

C.

set core-dump enable

>save config

D.

# set core-dump enable

# save config

Buy Now
Questions 20

What is the kernel process for Content Awareness that collects the data from the contexts received from the CMI and decides if the file is matched by a data type?

Options:

A.

cntawmod

B.

cntmgr

C.

dlpda

D.

dlpu

Buy Now
Questions 21

If the cpsemd process of SmartEvent has crashed or is having trouble coming up, then it usually indicates that __________.

Options:

A.

The SmartEvent core on the Solr indexer has been deleted

B.

The loqqed in administrator does not have permissions to run SmartEvent

C.

Postgres database is down

D.

Cpd daemon is unable to connect to the log server

Buy Now
Questions 22

What file contains the RAD proxy settings?

Options:

A.

rad_control.C

B.

rad_scheme.C

C.

rad_services.C

D.

rad_settings.C

Buy Now
Questions 23

You were asked by security team to debug Mobile Access VPN. What processes will you debug?

Options:

A.

HTTPD and CPVND

B.

IKED

C.

VPND and IKED

D.

SNX daemon

Buy Now
Questions 24

What are the main components of Check Point’s Security Management architecture?

Options:

A.

Management server, Log server, Gateway server. Security server

B.

Management server, management database, log server, automation server

C.

Management server. Security Gateway. Multi-Domain Server. SmartEvent Server

D.

Management server. Log Server, LDAP Server, Web Server

Buy Now
Questions 25

Where do you enable log indexing on the SMS?

Options:

A.

SMS object under "Other"

B.

SMS object under "Advanced"

C.

SMS object under "Logs"

D.

SMS object under "General Properties"

Buy Now
Questions 26

Your users are having trouble opening a Web page and you need to troubleshoot it. You open the Smart Console, and you get the following message when you navigate to the Logs and Monitor "SmartLog is not active or Failed to parse results from server". What is the first thing you can try to resolve it?

Options:

A.

Run the commands on the SMS: smartlogstart and smartlogstop

B.

smartlog debug on and smartlog debug off

C.

smartlog_server restart

D.

cpmstop and cpmstart

Buy Now
Questions 27

Which of the following is a component of the Context Management Infrastructure used to collect signatures in user space from multiple sources such as Application Control and IPS. and compiles them together into unified Pattern Matchers?

Options:

A.

Context Loader

B.

PSL - Passive Signature Loader

C.

cpas

D.

CMI Loader

Buy Now
Questions 28

RAD is initiated when Application Control and URL Filtering blades are active on the Security Gateway. What is the purpose of the following RAD configuration file $FWDIR/conf/rad_settings.C?

Options:

A.

This file contains the location information for Application Control and/or URL Filtering entitlements

B.

This file contains the information on how the Security Gateway reaches the Security Management Server's RAD service for Application Control and URL Filtering

C.

This file contains RAD proxy settings

D.

This file contains all the host name settings for the online application detection engine

Buy Now
Questions 29

What is the simplest and most efficient way to check all dropped packets in real time?

Options:

A.

tail -f $FWDIR/log/fw.log |grep drop in expert mode

B.

cat /dev/fw1/log in expert mode

C.

fw ctl zdebug + drop in expert mode

D.

Smartlog

Buy Now
Questions 30

In Check Point's Packet Processing Infrastructure what is the role of Observers?

Options:

A.

Observers attach object IDs to traffic

B.

They store Rule Base matching state related information

C.

Observers monitor the state of Check Point gateways and report it to the security manager

D.

Observers decide whether or not to publish a CLOB to the Security Policy

Buy Now
Questions 31

What command is usually used for general firewall kernel debugging and what is the size of the buffer that is automatically enabled when using the command?

Options:

A.

fw ctl debug, buffer size is 1024 KB

B.

fw ctl zdebug, buffer size is 1 MB

C.

fw ctl kdebug, buffer size is 32000 KB

D.

fw ctl zdebug, buffer size is 32768 KB

Buy Now
Questions 32

Which of these packet processing components stores Rule Base matching state-related information?

Options:

A.

Classifiers

B.

Manager

C.

Handlers

D.

Observers

Buy Now
Exam Code: 156-587
Exam Name: Check Point Certified Troubleshooting Expert - R81.20 (CCTE)
Last Update: Jul 6, 2025
Questions: 109

PDF + Testing Engine

$49.5  $164.99

Testing Engine

$37.5  $124.99
buy now 156-587 testing engine

PDF (Q&A)

$31.5  $104.99
buy now 156-587 pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 06 Jul 2025