Exam Details

  • Exam Code
    :156-585
  • Exam Name
    :Check Point Certified Troubleshooting Expert (CCTE)
  • Certification
    :Checkpoint Certifications
  • Vendor
    :CheckPoint
  • Total Questions
    :114 Q&As
  • Last Updated
    :Mar 06, 2025

CheckPoint Checkpoint Certifications 156-585 Questions & Answers

  • Question 91:

    What are the main components of Check Point's Security Management architecture?

    A. Management server, management database, log server, automation server

    B. Management server, Security Gateway. Multi-Domain Server, SmartEvent Server

    C. Management Server. Log Server. LDAP Server, Web Server

    D. Management server Log server, Gateway server. Security server

  • Question 92:

    Which command is used to write a kernel debug to a file?

    A. fw ctl debug -T -f > debug.txt

    B. fw ctl kdebug -T -l > debug.txt

    C. fw ctl debug -S -t > debug.txt

    D. fw ctl kdebug -T -f > debug.txt

  • Question 93:

    Which of the following is NOT a vpn debug command used for troubleshooting?

    A. fw ctl debug -m fw + conn drop vm crypt

    B. vpn debug trunc

    C. pclient getdata sslvpn

    D. vpn debug on TDERROR_ALL_ALL=5

  • Question 94:

    The two procedures available for debugging in the firewall kernel are i fw ctl zdebug ii fw ctl debug/kdebug Choose the correct statement explaining the differences in the two

    A. (i) Is used for general debugging, has a small buffer and is a quick way to set kernel debug flags to get an output via command line whereas

    (ii) is useful when there is a need for detailed debugging and requires additional steps to set the buffer and get an output via command line

    B. (i) is used to debug the access control policy only, however

    (ii) can be used to debug a unified policy

    C. (i) is used to debug only issues related to dropping of traffic, however

    (ii) can be used for any firewall issue including NATing, clustering etc.

    D. (i) is used on a Security Gateway, whereas

    (ii) is used on a Security Management Server

  • Question 95:

    John works for ABC Corporation. They have enabled CoreXL on their firewall John would like to identify the cores on which the SND runs and the cores on which the firewall instance is running. Which command should John run to view the CPU role allocation?

    A. fw ctl affinity -v

    B. fwaccel stat -I

    C. fw ctl affinity -I

    D. fw ctl cores

  • Question 96:

    During firewall kernel debug with fw ctl zdebug you received less information than expected. You noticed that a lot of messages were lost since the time the debug was started. What should you do to resolve this issue?

    A. Increase debug buffer; Use fw ctl debug -buf 32768

    B. Redirect debug output to file; Use fw ctl zdebug -o ./debug.elg

    C. Increase debug buffer; Use fw ctl zdebug -buf 32768

    D. Redirect debug output to file; Use fw ctl debug -o ./debug.elg

  • Question 97:

    The Check Point Firewall Kernel is the core component of the Gala operating system and an integral part of traffic inspection process. There are two procedures available for debugging the firewall kernel. Which procedure/command is used for detailed troubleshooting and needs more resources?

    A. fw ctl debug/kdebug

    B. fw ctl zdebug

    C. fw debug/kdebug

    D. fw debug/kdebug ctl

  • Question 98:

    PostgreSQL is a powerful, open source relational database management system Check Point offers a command for viewing the database to interact with Postgres interactive shell Which command do you need to enter the PostgreSQL interactive shell?

    A. psql_client cpm postgres

    B. mysql_client cpm postgres

    C. psql_c!ieni postgres cpm

    D. mysql -u root

  • Question 99:

    Which Threat Prevention Daemon is the core Threat Emulation engine and responsible for emulation files and communications with Threat Cloud?

    A. ctasd

    B. in.msd

    C. ted

    D. scrub

  • Question 100:

    How can you start debug of the Unified Policy with all possible flags turned on?

    A. fw ctl debug -m UP all

    B. fw ctl debug -m UnifiedPolicy all

    C. fw ctl debug -m fw + UP

    D. fw ctl debug -m UP *

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CheckPoint exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 156-585 exam preparations and CheckPoint certification application, do not hesitate to visit our Vcedump.com to find your solutions here.