156-587 MCQs and Practice Test


156-587 MCQs

156-587 TestPrep

156-587 Study Guide

156-587 Practice Test

156-587 Exam Questions


killexams.com Checkpoint 156-587


Check Point Certified Troubleshooting Expert (CCTE)

- R81.20


https://killexams.com/pass4sure/exam-detail/156-587

Download PDF for 156-587

Killexams Complete pool of Questions and Answers of 156-587: Check Point Certified Troubleshooting Expert (CCTE) - R81.20 covers the below exam outline.


- Identify and use Linux-based and Check Point commands and tools for system monitoring, file editing, and file viewing.



Below are sample questions. Full version contains complete set of Questions and Answers




Question: 805

How can you use the SmartLog to filter logs for a specific application traffic?


  1. By filtering logs using the Application column

  2. By filtering logs using the Source IP

  3. By filtering logs using the Log Type

  4. By using the Time Range filter

    Answer: A

Explanation: The Application column in SmartLog allows you to filter logs specifically for traffic related to a particular application.




Question: 806


Which command is used to view the status of Check Point licenses on a Security Gateway?


  1. cplic print

  2. fw ctl pstat

  3. cphaprob state

  4. cpstat fw

    Answer: A

Explanation: The command "cplic print" is used to view the status of Check

Point licenses on a Security Gateway. It displays information about the active licenses, license features, and expiration dates. Option B, "fw ctl pstat," displays the status of the firewall kernel and its various components. Option C, "cphaprob state," shows the state of the cluster members. Option D, "cpstat fw," retrieves firewall status information but does not specifically display license information.




Question: 807

If configuration changes are made on the Primary Management Server, how should they be replicated to the Secondary?


  1. Manually configure the Secondary

  2. Use the "cphaprob sync" command

  3. The changes replicate automatically

  4. Restart both servers

    Answer: C

Explanation: In a properly configured HA environment, changes made on the Primary replicate automatically to the Secondary.




Question: 808

If you need to verify the configuration of the API Server, which command provides detailed information?


  1. cpconfig

  2. show api-config

  3. api show config

  4. cpstat api

    Answer: C

Explanation: The api show config command gives a detailed view of the API Server's current configuration.




Question: 809


Which tool is used to troubleshoot VPN-related issues in Check Point firewalls?


  1. vpn debug

  2. fw ctl zdebug

  3. tcpdump

  4. sysconfig

    Answer: A

Explanation: The tool used to troubleshoot VPN-related issues in Check Point firewalls is "vpn debug". Vpn debug is a command-line utility that enables debugging and logging of VPN-related events and messages. It provides detailed information about VPN negotiations, encryption algorithms, authentication failures, and other VPN-related issues, aiding in troubleshooting and resolving VPN connectivity problems.




Question: 810

When debugging Unified Policy matches, what does the 'match' keyword indicate in the debug output?


  1. A rule has been bypassed

  2. A connection was allowed

  3. A rule has successfully matched a packet

  4. A packet has been dropped

    Answer: C

Explanation: The 'match' keyword in debug output indicates that a specific rule has successfully matched a packet, leading to further action based on that rule.




Question: 811

When is it appropriate to use the dbedit command?


  1. To make changes to the running configuration

  2. To directly edit the Management Database

  3. To check the status of database connections

  4. To restore a backup of the Management Server

    Answer: B

Explanation: The dbedit command allows direct editing of the Management Database, which should be done with caution.




Question: 812

If you suspect a NAT issue, which command is best to verify the NAT configuration and its effects?


  1. fw nat

  2. fw tab -t nat -s

  3. fw monitor

  4. fw log

    Answer: B

Explanation: The fw tab -t nat -s command displays statistics and configuration details about the NAT table, which is critical for troubleshooting NAT-related issues.




Question: 813

Which component of the Unified Policy helps in determining the decision path

for a traffic flow?


  1. Security Gateway

  2. Rule Base

  3. Policy Layers

  4. Threat Prevention

    Answer: C

Explanation: Policy Layers are crucial in determining the decision path for traffic flows, as they dictate the order and criteria for rule evaluation.




Question: 814


Which command can be used to display the kernel routing table?


  1. fw ctl route

  2. fw tab -t routing

  3. ip route show

  4. netstat -r

    Answer: C

Explanation: The command "ip route show" can be used to display the kernel routing table. It provides information about the network routes configured on the system, including the destination network, gateway, and interface.




Question: 815


Which command is used to display the current connections table in a Security Gateway?


  1. fw tab -t connections

  2. fw ctl conns

  3. fw monitor -e "accept;"

  4. fwaccel conns

    Answer: A

Explanation: The command "fw tab -t connections" is used to display the current connections table in a Security Gateway. The connections table maintains information about the active connections passing through the gateway, including source and destination IP addresses, ports, and connection state. This command is useful for troubleshooting connection-related issues and monitoring the current connections on the gateway.




Question: 816

What does the output of vpn tu -s provide?


  1. Status of VPN tunnels

  2. Security association details

  3. VPN configuration details

  4. Summary of VPN users

    Answer: A

Explanation: The vpn tu -s command provides a summary status of all VPN tunnels, helping to quickly assess the state of connections.




Question: 817


Which command can you use to verify the connectivity between two Check Point gateways in a VPN tunnel?


  1. fw monitor

  2. ping

  3. tcpdump

  4. traceroute

    Answer: B

Explanation: The "ping" command can be used to verify the connectivity between two Check Point gateways in a VPN tunnel. By sending ICMP echo request packets, you can check if the gateways can reach each other, which can be helpful in troubleshooting VPN connectivity issues.




Question: 818


Which tool can be used to troubleshoot and debug issues related to policy installation and rule matching in Check Point R81.20?


  1. SmartView Monitor

  2. SmartConsole

  3. cpview

  4. tcpdump

    Answer: B

Explanation: SmartConsole is the tool that can be used to troubleshoot and debug issues related to policy installation and rule matching in Check Point R81.20. It provides a graphical user interface (GUI) for managing security policies, rulebases, and objects. It allows administrators to analyze policy installation logs, check rule matching, and diagnose policy-related issues.




Question: 819

What command can you use to verify the status of a VPN tunnel on a Check Point gateway?


  1. vpn tu

  2. fw ctl pstat

  3. cphaprob state

  4. vpn stat

    Answer: A

Explanation: The vpn tu command provides detailed information about VPN tunnels, including their status and statistics.




Question: 820


Which of the following commands can be used to troubleshoot issues with Check Point Anti-Bot?


  1. fw ctl pstat

  2. cpstat fw

  3. fw monitor -e "accept (anti_bot=1) ;"

  4. fw tab -t connections -s

    Answer: B, C

Explanation: The "cpstat fw" command provides information about the state of Check Point Anti-Bot. The "fw monitor -e 'accept (anti_bot=1) ;'" command can be used to capture and analyze traffic related to Anti-Bot.




Question: 821

If SmartConsole is unable to connect due to a network issue, which command can help diagnose the connectivity?


  1. ping

  2. telnet

  3. traceroute

  4. All of the above



Answer: D


Explanation: All these commands can help diagnose different aspects of network connectivity issues affecting SmartConsole.




Question: 822

You are troubleshooting a connectivity issue with a VPN tunnel. Which log file should you check first to diagnose the problem?


  1. fw.log

  2. vpn.log

  3. user.log

  4. cp.log

    Answer: B

Explanation: The vpn.log file contains detailed information about VPN connections, making it the first log to check for tunnel-related issues.




Question: 823

In the context of troubleshooting, what does the fw ctl pstat command display?


  1. The policy installation status.

  2. The current CPU and memory usage of the firewall.

  3. The connection table statistics.

  4. The status of the VPN tunnels.

    Answer: B

Explanation: The fw ctl pstat command provides information about the current CPU and memory usage of the firewall, which can help in diagnosing performance issues.



Question: 824


Which command is used to verify the connectivity between two Security Gateways in a cluster?


  1. cphaprob state

  2. fw ctl pstat

  3. cphaprob -a if

  4. fw ctl affinity -l

    Answer: A

Explanation: The correct command to verify the connectivity between two Security Gateways in a cluster is "cphaprob state." This command displays the state of the cluster members and provides information about their connectivity status. Option B, "fw ctl pstat," displays the status of the firewall kernel and its various components but does not specifically verify connectivity between cluster members. Option C, "cphaprob -a if," shows the interface status of the cluster members but does not directly verify connectivity. Option D, "fw ctl affinity -l," displays the CPU affinity settings and is not used for verifying cluster connectivity.




Question: 825

In CPView, which section provides real-time data on CPU and memory usage?


  1. System Resources

  2. Traffic Statistics

  3. Process Overview

  4. Connection Status

    Answer: A

Explanation: The "System Resources" section in CPView displays real-time data regarding CPU and memory usage.




Question: 826


Emily is troubleshooting a NAT-related issue on a Check Point firewall running R81.20. She wants to view the current NAT translation table entries. Which command should Emily use?


  1. fw tab -t fwx_alloc

  2. fw tab -t nat

  3. fw ctl pstat

  4. cpstat fw

    Answer: B

Explanation: To view the current NAT translation table entries, Emily should use the "fw tab -t nat" command. This command displays the contents of the NAT table, which contains the active NAT translations performed by the firewall.




Question: 827


Which command is used to verify the synchronized state of the cluster members?


  1. cphaprob state

  2. fw ctl affinity -l

  3. fw monitor -e "accept;"

  4. cpwd_admin list

    Answer: A

Explanation: The command "cphaprob state" is used to verify the synchronized state of the cluster members in a Check Point cluster. It displays the current state of each cluster member, indicating whether they are active, standby, or in a fault state. This command is useful for troubleshooting cluster-related issues and ensuring the proper functioning of the cluster.




Question: 828

Which command is used to reset the VPN client configuration on a remote machine?


  1. vpn reset

  2. vpn client reset

  3. vpn client config

  4. vpn config reset

    Answer: B

Explanation: The vpn client reset command resets the VPN client configuration on the remote machine, which can resolve configuration-related issues.




Question: 829


Which command is used to display the status of the SecureXL device?


  1. fwaccel stat

  2. fw ctl affinity -l

  3. fwaccel conns

  4. fw tab -t connections

    Answer: A

Explanation: The command "fwaccel stat" is used to display the status of the SecureXL device. It provides information about the current state of SecureXL,

including whether it is enabled or disabled and the number of connections accelerated.


KILLEXAMS.COM


Killexams.com is a leading online platform specializing in high-quality certification exam preparation. Offering a robust suite of tools, including MCQs, practice tests, and advanced test engines, Killexams.com empowers candidates to excel in their certification exams. Discover the key features that make Killexams.com the go-to choice for exam success.



Exam Questions:

Killexams.com provides exam questions that are experienced in test centers. These questions are updated regularly to ensure they are up-to-date and relevant to the latest exam syllabus. By studying these questions, candidates can familiarize themselves with the content and format of the real exam.


Exam MCQs:

Killexams.com offers exam MCQs in PDF format. These questions contain a comprehensive

collection of questions and answers that cover the exam topics. By using these MCQs, candidate can enhance their knowledge and improve their chances of success in the certification exam.


Practice Test:

Killexams.com provides practice test through their desktop test engine and online test engine. These practice tests simulate the real exam environment and help candidates assess their readiness for the actual exam. The practice test cover a wide range of questions and enable candidates to identify their strengths and weaknesses.


Guaranteed Success:

Killexams.com offers a success guarantee with the exam MCQs. Killexams claim that by using this materials, candidates will pass their exams on the first attempt or they will get refund for the purchase price. This guarantee provides assurance and confidence to individuals preparing for certification exam.


Updated Contents:

Killexams.com regularly updates its question bank of MCQs to ensure that they are current and reflect the latest changes in the exam syllabus. This helps candidates stay up-to-date with the exam content and increases their chances of success.

Back to Home