Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

What tool would you run to diagnose logging and indexing?

A.

run cpm_doctor.sh

B.

cpstat mg -f log_server

C.

run diagnostic view

D.

run doctor-log.sh

Full Access
Question # 5

What command would you run to verify the communication between the Security Gateway and the Identity Collector?

A.

fw ctl debug -m IDAPI

B.

pdp connections idc

C.

fw ctl debug -m fw + nac

D.

adlog

Full Access
Question # 6

When viewing data for CPMI objects in the Postgres database, what table column should be selected to query for the object instance?

A.

CpmiHostCkp

B.

fwset

C.

CPM Global M

D.

GuiDBedit

Full Access
Question # 7

You found out that $FWDIR/Iog/fw.log is constantly growing in size at a Security Gateway, what is the reason?

A.

TCP state logging is enabled

B.

Its not a problem the gateways is logging connections and also sessions

C.

fw.log can grow when GW does not have space in logging directory

D.

The GW is logging locally

Full Access
Question # 8

An administrator receives reports about issues with log indexing and text searching regarding an existing Management Server. In trying to find a solution she wants to check if the process responsible for this feature is running correctly. What is true about the related process?

A.

cpd needs to be restarted manual to show in the list

B.

fwm manaqes this database after initialization of the 1CA

C.

solr is a child process of cpm

D.

fwssd crashes can affect therefore not show in the list

Full Access
Question # 9

Packet processing infrastructure consists of the following components EXCEPT:

A.

Observers

B.

Manager

C.

Client

D.

Classifiers

Full Access
Question # 10

What clicommand is run on the GW to verifycommunication to the identity Collector?

A.

pdp connections idc

B.

pep connections idc

C.

show idc connections

D.

fwd connected

Full Access
Question # 11

Troubleshooting issues with Mobile Access requires the following:

A.

'ma_vpnd' process on Security Gateway

B.

Debug logs of FWD captured with the command - ‘fw debug fwd on TDERROR_MOBILE_ACCESS=5'

C.

Standard VPN debugs, packet captures and debugs of cvpnd1 process on Security Gateway

D.

Standard VPN debugs and packet captures on Security Gateway, debugs of 'cvpnd' process on Security Management

Full Access
Question # 12

What components make up the Context Management Infrastructure?

A.

CPMI and FW Loader

B.

CPX and FWM

C.

CPM and SOLR

D.

CMI Loader and Pattern Matcher

Full Access
Question # 13

In Check Point's Packet Processing Infrastructure what is the role of Observers?

A.

Observers attach object IDs to traffic

B.

They store Rule Base matching state related information

C.

Observers monitor the state of Check Point gateways and report it to the security manager

D.

Observers decide whether or not to publish a CLOB to the Security Policy

Full Access
Question # 14

You need to run a kernel debug over a longer period of time as the problem occurs only once or twice a week. Therefore you need to add a timestamp to the kernel debug and write the output to a file

but you cant afford to fill up all the remaining disk space and you only have 10 GB free for saving the debugs What is the correct syntax for this?

A.

A fw ctl kdebug -T -f -m 10 -s 1000000 -o debugfilename

B.

fw ctl debug -T -f-m 10 -s 1000000 -o debugfilename

C.

fw ctl kdebug -T -f -m 10 -s 1000000 > debugfilename

D.

fw ctl kdebug -T -m 10 -s 1000000 -o debugfilename

Full Access
Question # 15

What is the buffer size set by the fw ctl zdebug command?

A.

8GB

B.

1 MB

C.

1 GB

D.

8 MB

Full Access
Question # 16

You were asked by securityteam to debug Mobile Access VPN.What processes will you debug?

A.

HTTPD and CPVND

B.

IKED

C.

VPND and IKED

D.

SNX daemon

Full Access
Question # 17

The FileApp parser in the Content Awareness engine does not extract text from which of the following file types?

A.

Microsoft Office Excel files

B.

Microsoft Office PowerPoint files

C.

Microsoft Office.docx files

D.

PDFs

Full Access
Question # 18

What is the proper command for allowing the system to create core files?

A.

service core-dump start

B.

SFWDIR/scripts/core-dump-enable.sh

C.

set core-dump enable

>save config

D.

# set core-dump enable

# save config

Full Access
Question # 19

What is the best way to resolve an issue caused by a frozen process?

A.

Power off the machine

B.

Restart the process

C.

Reboot the machine

D.

Kill the process

Full Access
Question # 20

You are using the identity Collector with identityAwareness in large environment.Users report that they cannot access resources on Internet You identify that the traffic is matching the cleanup rule

Instead of the proper rule with Access Roles using the IDC How can you check if IDC is working?

A.

pdp connections idc

B.

ad query I debug on

C.

pep debug idc on

D.

pdp debug set IDP all

Full Access
Question # 21

SmartEvent utilizes the Log Server, Correlation Unit and SmartEvent Server to aggregate logs and identify security events. The three main processes that govern these SmartEvent components are:

A.

cpcu, cplog, cpse

B.

eventiasv, eventiarp,eventiacu

C.

cpsemd, cpsead, and DBSync

D.

fwd, secu, sesrv

Full Access
Question # 22

Which Daemon should be debugged for HTTPS inspection related issues?

A.

VPND

B.

WSTLSD

C.

FWD

D.

HTTPD

Full Access
Question # 23

What does CMI stand for in relation to the Access Control Policy?

A.

Context Manipulation Interface

B.

Context Management Infrastructure

C.

Content Management Interface

D.

Content Matching Infrastructure

Full Access