New Year Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Checkpoint 156-582 Check Point Certified Troubleshooting Administrator - R81.20 (CCTA) Exam Practice Test

Page: 1 / 8
Total 75 questions

Check Point Certified Troubleshooting Administrator - R81.20 (CCTA) Questions and Answers

Question 1

Which of the following is a valid way to capture packets on Check Point gateways?

Options:

A.

Firewall logs

B.

Wireshark

C.

tcpdump

D.

Network taps

Question 2

Select the correct statement about service contracts.

Options:

A.

Valid service contracts must be stored only on the Security Gateways that have Threat Prevention blades enabled

B.

Service contracts are provided on paper only

C.

Valid service contracts are only stored and required on the Primary Security Management Server and never downloaded on any other system

D.

Valid service contracts must be stored on the Security Management Server before they can be downloaded to a Security Gateway

Question 3

Which of the following CLI commands is best to use for getting a quick look at appliance performance information in Gaia?

Options:

A.

fw stat

B.

fw monitor

C.

cpview

D.

cphaprob stat

Question 4

When is the Enable Bypass Under Load used in IPS?

Options:

A.

When the threshold is reached for connections and throughput

B.

When there is a problem with IPS and connectivity cannot be guaranteed

C.

When the threshold is reached for CPU and memory

D.

When there is an ongoing attack, the Security Gateway puts its state to maintenance mode to prevent attackers from breaching the network

Question 5

When running the cplic command, what argument is used to show the Signature key?

Options:

A.

-x

B.

-rn

C.

-s

D.

-yall

Question 6

You want to print the status of WatchDog-monitored processes. What command best meets your needs?

Options:

A.

cpwd_admin list

B.

tcpdump

C.

cppcap

D.

cpplic print

Question 7

What is the process of intercepting and logging traffic?

Options:

A.

Debugging

B.

Forensics Analysis

C.

Logging

D.

Packet Capturing

Question 8

What does the FWD daemon instruct the gateway to do when communication issues between the gateway and SMS/Log Server occur?

Options:

A.

It instructs the gateway to continue forwarding logs to SMS/Log Server and the logs will be stored in a holding queue for the server until communication is restored.

B.

It instructs the gateway to stop logging until it can restore communication.

C.

It instructs the gateway to store logs locally as it continues to try to restore communication.

D.

It instructs the gateway to only log a specified number of logs as defined in the Security Policy.

Question 9

UserCenter/PartnerMAP access is based on what criteria?

Options:

A.

The certification level achieved by employees of an organization.

B.

User permissions assigned to company contacts.

C.

The certification level achieved by the partner.

D.

The level of Support purchased by a company manager.

Question 10

Customer wants to use autonomous threat prevention. How do you enable it?

Options:

A.

Enable Autonomous Threat Prevention on the Security Gateway from the SmartConsole: Gateway and Servers view and enable IPS on the Security Gateway by the command: ips on.

B.

Enable Autonomous Threat Prevention on the Security Gateway from the SmartConsole:Gateway and Servers view, the default profile Strict Security will be selected.

C.

Enable Autonomous Threat Prevention on the Security Gateway from the SmartConsole: Gateway and Servers view, inspection profile is not needed, the Security Gateway will automatically select the best profile according to deployment.

D.

Enable Autonomous Threat Prevention on the Security Gateway from the SmartConsole: Gateway and Servers view, then select inspection profile.

Question 11

How would you check the connection status of a gateway to the Log server?

Options:

A.

Run netstat -anp | grep :257 in CLISH on Log server

B.

Run netstat -anp | grep :257 in expert mode on Log server

C.

Run netstat -anp | grep :18187 in expert mode on Log server

D.

Run netstat -anp | grep :18187 in CLISH on Log server

Question 12

What are some measures you can take to prevent IPS false positives?

Options:

A.

Capture packets, Update the IPS database, and Back up custom IPS files

B.

Use Recommended IPS profile

C.

Use IPS only in Detect mode

D.

Exclude problematic services from being protected by IPS (sip, H.323, etc.)

Question 13

Which of the following System Monitoring Commands (Linux) shows process resource utilization, as well as CPU and memory utilization?

Options:

A.

df

B.

free

C.

ps

D.

top

Question 14

Which is the correct "fw monitor" syntax for creating a capture file for loading it into Wireshark?

Options:

A.

fw monitor -e "accept Output.cap

B.

This cannot be accomplished as it is not supported with R80.10

C.

fw monitor -e "accept

D.

fw monitor -e "accept

Question 15

Services with expired licenses and contracts have,

Options:

A.

full functionality for 90 days after they expire

B.

full functionality for 45 days after they expire

C.

no functionality

D.

limited functionality

Question 16

Which of the following would be the most appropriate command in debugging a HideNAT issue?

Options:

A.

fw ctl zdebug + fwn allnat

B.

fw ctl zdebug + dynamic natips natports

C.

fw ctl zdebug + xlate xltrc nat

D.

fw ctl zdebug + fwxalloc hidenat

Question 17

How many different types of Service Requests exist?

Options:

A.

4

B.

2

C.

3

D.

5

Question 18

Check Point provides tools & commands to help you identify issues about products and applications. Which Check Point command can help you display status and statistics information for various Check Point products and applications?

Options:

A.

cpstat

B.

CP-stat

C.

CPview

D.

fwstat

Question 19

In the Security Management Architecture, what port and process SmartConsole uses to communicate with the management server?

Options:

A.

CPM 19009 and 18191

B.

CPM and 18190

C.

CPM and 19009

D.

FWM and 19009

Page: 1 / 8
Total 75 questions