Checkpoint 156-585 Exam Practice Questions (P. 3)
- Full Access (75 questions)
- One Year of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #11
During firewall kernel debug with fw ctl zdebug you received less information that expected. You noticed that a lot of messages were lost since the time the debug was started. What should you do to resolve this issue?
- AIncrease debug buffer; Use fw ctl debug -buf 32768Most Voted
- BRedirect debug output file; Use fw ctl zdebug -o ./debug.elg
- CIncrease debug buffer; Use fw ctl zdebug -buf 32768
- DRedirect debug output file; Use fw ctl debug -o ./debug.elg
Correct Answer:
A
A
send
light_mode
delete
Question #12
Where do Protocol parsers register themselves for IPS?
- APassive Streaming LibraryMost Voted
- BOther handlers register to Protocol parser
- CProtections database
- DContext Management Infrastructure
Correct Answer:
A
A
send
light_mode
delete
Question #13
Which command can be run in Expert mode to verify the core dump settings?
- Agrep cdm /config/db/coredump
- Bgrep cdm /config/db/initialMost Voted
- Cgrep $FWDIR/config/db/initial
- Dcat /etc/sysconfig/coredump/cdm.conf
Correct Answer:
C
C
send
light_mode
delete
Question #14
The two procedures available for debugging in the firewall kernel are: i. fw ctl zdebug ii. fw ctl debug/kdebug
Choose the correct statement explaining the difference in the two.
Choose the correct statement explaining the difference in the two.
- A(i) Is used for general debugging, has a small buffer and is a quick way to set kernel debug flags to get an output via command line whereas (ii) is useful when there is a need for detailed debugging and requires additional steps to set the buffer and get an output via command lineMost Voted
- B(i) is used to debug the access control policy only, however (ii) can be used to debug a unified policy
- C(i) is used to debug only issues related to dropping traffic, however (ii) can be used for any firewall issue including NATing, clustering etc.
- D(i) is used on a Security Gateway, whereas (ii) is used on a Security Management Server
Correct Answer:
C
C
send
light_mode
delete
Question #15
If the cpsemd process of SmartEvent has crashed or is having trouble to coming up, then it usually indicates that _______________.
- APostgres database is downMost Voted
- BCpd daemon is unable to connect to the log server
- CThe SmartEvent core on the Solr indexer has been deleted
- DThe logged in administrator does not have permissions to run SmartEvent
Correct Answer:
C
C
send
light_mode
delete
All Pages
