Check Point Certified Troubleshooting Expert v1.0

Page:    1 / 5   
Exam contains 75 questions

What are the three main component of Identity Awareness?

  • A. User, Active Directory and Access Role
  • B. Identity Awareness Blade on Security Gateway, User Database on Security Management Server and Active Directory
  • C. Identity Source, Identity Server (PDP) and Identity Enforcement (PEP)
  • D. Client, SMS and Secure Gateway


Answer : C

VPN's allow traffic to pass through the Internet securely by encrypting the traffic as it enters the VPN tunnel and then decrypting the traffic as it exists. Which process is responsible for Mobile VPN connections?

  • A. cvpnd
  • B. vpnk
  • C. fwk
  • D. vpnd


Answer : A

What is the correct syntax to set all debug flags for Unified Policy related issues?

  • A. fw ctl kdebug -m UP all
  • B. fw ctl debug -m fw all
  • C. fw ctl debug -m up all
  • D. fw ctl debug -m UP all


Answer : D

You receive reports from multiple users that they cannot browse. Upon further discovery you identify that Identity Awareness cannot identify the users properly and apply the configured Access Roles. What commands you can use to troubleshoot all identity collectors and identity providers from the command line?

  • A. on the gateway: pdp debug set AD all and IDC all
  • B. on the management: pdp debug on IDC all
  • C. on the management: pdp debug set all all
  • D. on the gateway: pdp debug set IDC all IDP all


Answer : D

What are the main components of Check Point’s Security Management architecture?

  • A. Management server, Log server, Gateway server, Security server
  • B. Management server, management database, log server, automation server
  • C. Management server, Security Gateway, Multi-Domain Server, SmartEvent Server
  • D. Management server, Log Server, LDAP Server, Web Server


Answer : B

What Check Point process controls logging?

  • A. FWD
  • B. CPWD
  • C. CPM
  • D. CPD


Answer : A

Which of the following daemons is used for Threat Extraction?

  • A. tedex
  • B. extractd
  • C. tex
  • D. scrubd


Answer : D

If the cpsemd process of SmartEvent has crashed or is having trouble coming up, then it usually indicates that __________.

  • A. The SmartEvent core on the Solr indexer has been deleted
  • B. The logged in administrator does not have permissions to run SmartEvent
  • C. Postgres database is down
  • D. Cpd daemon is unable to connect to the log server


Answer : C

Your users are having trouble opening a Web page and you need to troubleshoot it. You open the Smart Console, and you get the following message when you navigate to the Logs and Monitor "SmartLog is not active or Failed to parse results from server". What is the first thing you can try to resolve it?

  • A. Run the commands on the SMS: smartlogstart and smartlogstop
  • B. smartlog debug on and smartlog debug off
  • C. smartlog_server restart
  • D. cpmstop and cpmstart


Answer : C

You do not see logs in the SMS. When you login on the SMS shell and run cpwd_admin list you notice that the RFL process is with status T. What command can you run to try to resolve it?

  • A. RFLstop and RFLstart
  • B. evstart and evstop
  • C. smartlog_server stop and smartlog_server restart
  • D. rflsop and rflstart


Answer : D

Where do you enable log indexing on the SMS?

  • A. SMS object under "Other"
  • B. SMS object under "Advanced"
  • C. SMS object under "Logs"
  • D. SMS object under "General Properties"


Answer : C

What is the correct syntax to turn a VPN debug on and create new empty debug files?

  • A. vpn debug trunkon
  • B. vpn debug truncon
  • C. vpndebug trunc on
  • D. vpn kdebug on


Answer : B

Which of the following file is commonly associated with troubleshooting crashes on a system such as the Security Gateway?

  • A. fw monitor
  • B. CPMIL dump
  • C. core dump
  • D. tcpdump


Answer : C

When a User process or program suddenly crashes, a core dump is often used to examine the problem. Which command is used to enable the core-dumping via GAIA clish?

  • A. set core-dump enable
  • B. set core-dump per_process
  • C. set user-dump enable
  • D. set core-dump total


Answer : A

The management configuration stored in the Postgres database is partitioned into several relational database domains. What is the purpose of the Global Domain?

  • A. Global Domains is used by the IPS software blade to map the IDs to the corresponding countries according to the IpToCountry.csv file.
  • B. This domain is used as the global database to back up the objects referencing the corresponding object attributes from the System Domain.
  • C. This domain is used as the global database to track the changes made by multiple administrators on the same objects prior to publishing.
  • D. This domain is used as the global database for MDSM and contains global objects and policies.


Answer : D

Page:    1 / 5   
Exam contains 75 questions

Talk to us!


Have any questions or issues ? Please dont hesitate to contact us

Certlibrary.com is owned by MBS Tech Limited: Room 1905 Nam Wo Hong Building, 148 Wing Lok Street, Sheung Wan, Hong Kong. Company registration number: 2310926
Certlibrary doesn't offer Real Microsoft Exam Questions. Certlibrary Materials do not contain actual questions and answers from Cisco's Certification Exams.
CFA Institute does not endorse, promote or warrant the accuracy or quality of Certlibrary. CFA® and Chartered Financial Analyst® are registered trademarks owned by CFA Institute.
Terms & Conditions | Privacy Policy