Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

What does CMI stand for in relation to the Access Control Policy?

A.

Context Manipulation Interface

B.

Context Management Infrastructure

C.

Content Management Interface

D.

Content Matching Infrastructure

Full Access
Question # 5

Your users are having trouble opening a Web page and you need to troubleshoot it. You open the Smart Console, and you get the following message when you navigate to the Logs and Monitor "SmartLog is not active or Failed to parse results from server". What is the first thing you can try to resolve it?

A.

Run the commands on the SMS: smartlogstart and smartlogstop

B.

smartlog debug on and smartlog debug off

C.

smartlog_server restart

D.

cpmstop and cpmstart

Full Access
Question # 6

What function receives the AD log event information?

A.

FWD

B.

CPD

C.

PEP

D.

ADLOG

Full Access
Question # 7

What is the buffer size set by the fw ctl zdebug command?

A.

8GB

B.

1 MB

C.

1 GB

D.

8 MB

Full Access
Question # 8

You need to run a kernel debug over a longer period of time as the problem occurs only once or twice a week Therefore you need to add a timestamp to the kernel debug and write the output to a file. What is the correct syntax for this?

A.

fw ctl debug -T -f > filename debug

B.

fw ctl kdebug -T -f -o filename debug

C.

fw ell kdebug -T > filename debug

D.

fw ctl kdebug -T -f > filename.debug

Full Access
Question # 9

John has renewed his NPTX License but he gets an error (contract for Anti-Bot expired). He wants to check the subscription status on the CLI of the gateway, what command can he use for this?

A.

fwm lie print

B.

fw monitor license status

C.

cpstat antimalware-f subscription status

D.

show license status

Full Access
Question # 10

You want to fully investigate the VPN establishment, what will you do?

A.

vpn debug and use IKEview

B.

debug FWD because VPND Is child process

C.

use vpn tu command and use option 8 to start debug

D.

use kernel debug with fw ctl debug -m VPN all

Full Access
Question # 11

What is the name of the VPN kernel process?

A.

VPND

B.

CVPND

C.

FWK

D.

VPNK

Full Access
Question # 12

Which of these packet processing components stores Rule Base matching state-related information?

A.

Classifiers

B.

Manager

C.

Handlers

D.

Observers

Full Access
Question # 13

SmartEvent utilizes the Log Server, Correlation Unit and SmartEvent Server to aggregate logs and identify security events. The three main processes that govern these SmartEvent components are:

A.

cpcu, cplog, cpse

B.

eventiasv, eventiarp,eventiacu

C.

cpsemd, cpsead, and DBSync

D.

fwd, secu, sesrv

Full Access
Question # 14

What is the benefit of fw ctl debug over fw ctl zdebug?

A.

There is no difference Both are used for debugging kernel

B.

You don't need timestamps

C.

It allows you to debug multiple modules at the same time

D.

You only need 1MB buffer

Full Access
Question # 15

After kernel debug with “fw ctl debug you received a huge amount of information It was saved in a very large file that is difficult to open and analyze with standard text editors Suggest a solution to

solve this issue

A.

Reduce debug buffer to 1024KB and run debug for several times

B.

Use Check Point InfoView utility to analyze debug output

C.

Use “fw ctl zdebug because of 1024KB buffer size

D.

Divide debug information into smaller files. Use “ fw ctl kdebug -f -o “filename -m 25 - s ‘’1024’’

Full Access
Question # 16

Which of the following daemons is used for Threat Extraction?

A.

extractd

B.

tedex

C.

tex

D.

scrubd

Full Access
Question # 17

How many packets are needed to establish IKEv1?

A.

Only three packets for main mode

B.

8

C.

5

D.

6

Full Access
Question # 18

In some scenarios it is very helpful to use advanced Linux commands for troubleshooting purposes. Which command displays information about resource utilization for running processes and shows additional information for core utilization and memory?

A.

top

B.

vmstat

C.

cptop

D.

mpstat

Full Access
Question # 19

What is the function of the Core Dump Manager utility?

A.

To determine which process is slowing down the system

B.

To send crash information to an external analyzer

C.

To limit the number of core dump files per process as well as the total amount of disk space used by core files

D.

To generate a new core dump for analysis

Full Access
Question # 20

What are the three main component of Identity Awareness?

A.

Client, SMS and Secure Gateway

B.

Identity Source Identity Server (POP) and Identity Enforcement (PEP)

C.

Identity Awareness Blade on Security Gateway, User Database on Security Management Server and Active Directory

D.

User, Active Directory and Access Role

Full Access
Question # 21

PostgreSQL is a powerful, open source relational database management system. Check Point offers a command for viewing the database to interact with Postgres interactive shell. Which command do you need to enter the PostgreSQL interactive shell?

A.

mysql_client cpm postgres

B.

mysql -u root

C.

psql_client cpm postgres

D.

psql_client postgres cpm

Full Access
Question # 22

What version of Check Point can Security Gateways begin dynamically distributing Logs between log servers?

A.

R81

B.

R77

C.

R30

D.

R75

Full Access
Question # 23

What information does the doctor-log script supply?

A.

Logging errors. Exceptions, Repair options

B.

Current and daily average logging rates. Indexing status, Size

C.

Logging rates, Logging Directories, List of troubleshooting tips

D.

Repair options. Logging Rates, Logging Directories

Full Access
Question # 24

In Mobile Access VPN. clientless access is done using a web browser. The primary communication path for these browser based connections is a process that allows numerous processes to utilize port

443 and redirects traffic to a designated port of the respective process Which daemon handles this?

A.

Multi-portal Daemon (MPD)

B.

Mobile Access Daemon (MAD)

C.

HTTPS Inspection Daemon (HID)

D.

Connectra VPN Daemon (cvpnd)

Full Access
Question # 25

Check Point Access Control Daemons contains several daemons for Software Blades and features. Which Daemon is used for Application & Control URL Filtering?

A.

pdpd

B.

rad

C.

cprad

D.

pepd

Full Access
Question # 26

When URL category is not found in the kernel cache, what action will GW do?

A.

RAD In user space will forward request to the cloud

B.

GW will update kernel cache during next policy install

C.

RAD in kernel space will forward request to the cloud

D.

RAD forwards this request to CMI which is the brain of inspection

Full Access
Question # 27

Packet processing infrastructure consists of the following components EXCEPT:

A.

Observers

B.

Manager

C.

Client

D.

Classifiers

Full Access
Question # 28

The two procedures available for debugging in the firewall kernel are

i. fw ctl zdebug

ii. fw ctl debug/kdebug

Choose the correct statement explaining the differences in the two

A.

(i) is used to debug only issues related to dropping of traffic, however (ii) can be used for any firewall issue including NATing, clustering etc.

B.

(i) is used to debug the access control policy only, however (ii) can be used to debug a unified policy

C.

(i) is used on a Security Gateway, whereas (ii) is used on a Security Management Server

D.

(i) is used for general debugging, has a small buffer and is a quick way to set kernel debug flags to getan output via command line whereas (ii) is useful when there is a need for detailed debugging and requires additional steps to set the buffer and get an output via command line

Full Access
Question # 29

Like a Site-to-Site VPN between two Security Gateways, a Remote Access VPN relies on the Internet Key Exchange (IKE) what types of keys are generated by IKE during negotiation?

A.

Produce a symmetric key on both sides

B.

Produce an asymmetric key on both sides

C.

Symmetric keys based on pre-shared secret

D.

Produce a pair of public and private keys

Full Access
Question # 30

What are the main components of Check Point’s Security Management architecture?

A.

Management server, Log server, Gateway server. Security server

B.

Management server, management database, log server, automation server

C.

Management server. Security Gateway. Multi-Domain Server. SmartEvent Server

D.

Management server. Log Server, LDAP Server, Web Server

Full Access
Question # 31

What is the correct syntax to turn a VPN debug on and create new empty debug files'?

A.

vpndebug trunc on

B.

vpn debug truncon

C.

vpn debug trunkon

D.

vpn kdebug on

Full Access
Question # 32

What command(s) will turn off all vpn debug collection?

A.

vpn debug -a off

B.

fw ctl debug 0

C.

vpn debug off

D.

vpn debug off and vpn debug Ikeoff

Full Access