Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

156-587 Exam Dumps - Checkpoint CCTE Questions and Answers

Question # 14

What process monitors terminates, and restarts critical Check Point processes as necessary?

Options:

A.

CPM

B.

FWD

C.

CPWD

D.

FWM

Buy Now
Question # 15

The two procedures available for debugging in the firewall kernel are

i. fw ctl zdebug

ii. fw ctl debug/kdebug

Choose the correct statement explaining the differences in the two

Options:

A.

(i) is used to debug only issues related to dropping of traffic, however (ii) can be used for any firewall issue including NATing, clustering etc.

B.

(i) is used to debug the access control policy only, however (ii) can be used to debug a unified policy

C.

(i) is used on a Security Gateway, whereas (ii) is used on a Security Management Server

D.

(i) is used for general debugging, has a small buffer and is a quick way to set kernel debug flags to getan output via command line whereas (ii) is useful when there is a need for detailed debugging and requires additional steps to set the buffer and get an output via command line

Buy Now
Question # 16

Which of the following daemons is used for Threat Extraction?

Options:

A.

extractd

B.

tedex

C.

tex

D.

scrubd

Buy Now
Question # 17

The management configuration stored in the Postgres database is partitioned into several relational database domains. What is the purpose of the Global Domain?

Options:

A.

Global Domains is used by the IPS software blade to map the IDs to the corresponding countries according to the IpToCountry.csv file.

B.

This domain is used as the global database to back up the objects referencing the corresponding object attributes from the System Domain.

C.

This domain is used as the global database to track the changes made by multiple administrators on the same objects prior to publishing.

D.

This domain is used as the global database for MDSM and contains global objects and policies.

Buy Now
Question # 18

What are the three main component of Identity Awareness?

Options:

A.

Client, SMS and Secure Gateway

B.

Identity Source Identity Server (POP) and Identity Enforcement (PEP)

C.

Identity Awareness Blade on Security Gateway, User Database on Security Management Server and Active Directory

D.

User, Active Directory and Access Role

Buy Now
Question # 19

You run cpwd_admin list on a Security Gateway and notice that the CPM process is not listed. Select the best answer.

Options:

A.

The output is different between Gateway and Management Server.

B.

CPM is not running and can’t be monitored by WatchDog.

C.

If you want to monitor CPM, you have to manually add it to WatchDog.

D.

CPM is not there because it has its own monitoring system. Only lower processes are monitored by WatchDog.

Buy Now
Question # 20

You receive reports from multiple users that they cannot browse Upon further discovery you identify that Identity Awareness cannot identify the users properly and apply the configuredAccess Roles

What commands you can use to troubleshoot all identity collectors and identity providers from the command line?

Options:

A.

on the gateway: pdp debug set IDC all IDP all

B.

on the gateway: pdp debug set AD all and IDC all

C.

on the management: pdp debug on IDC all

D.

on the management: pdp debug set all

Buy Now
Question # 21

Which two files contain the Application Database on the Security Gateway?

Options:

A.

api_db.C and api_custom_db.C

B.

apcl_db.C and apd_custom_db.C

C.

application_db.C and application_custom_db.C

D.

appi_db.C and appi_custom_db.C

Buy Now
Question # 22

You need to run a kernel debug over a longer period of time as the problem occurs only once or twice a week. Therefore you need to add a timestamp to the kernel debug and write the output to a file

but you cant afford to fill up all the remaining disk space and you only have 10 GB free for saving the debugs What is the correct syntax for this?

Options:

A.

A fw ctl kdebug -T -f -m 10 -s 1000000 -o debugfilename

B.

fw ctl debug -T -f-m 10 -s 1000000 -o debugfilename

C.

fw ctl kdebug -T -f -m 10 -s 1000000 > debugfilename

D.

fw ctl kdebug -T -m 10 -s 1000000 -o debugfilename

Buy Now
Question # 23

Which of the following is contained in the System Domain of the Postgres database?

Options:

A.

Trusted GUI clients

B.

Configuration data of log servers

C.

Saved queries for applications

D.

User modified configurations such as network objects

Buy Now
Exam Code: 156-587
Exam Name: Check Point Certified Troubleshooting Expert - R81.20 (CCTE)
Last Update: Jun 15, 2025
Questions: 109
156-587 pdf

156-587 PDF

$29.75  $84.99
156-587 Engine

156-587 Testing Engine

$33.25  $94.99
156-587 PDF + Engine

156-587 PDF + Testing Engine

$47.25  $134.99