New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

156-582 Questions and Answers

Question # 6

Which of the following is NOT a way to insert fw monitor into the chain when troubleshooting packets throughout the chain?

A.

Relative position using id

B.

Absolute position

C.

Relative position using location

D.

Relative position using alias

Full Access
Question # 7

What is the correct process for GUI connectivity issues with SmartConsole troubleshooting?

A.

Processes (FWM and CPM), Connectivity, GUI clients, Certificate, Authentication

B.

First troubleshoot Authentication and then the rest

C.

Reinstall the SmartConsole and check if it's running properly

D.

Connectivity, Processes (FWM and CPM), GUI clients, Certificate, Authentication

Full Access
Question # 8

What Check Point process controls logging?

A.

CPWD

B.

FWD

C.

CPD

D.

CPM

Full Access
Question # 9

After manipulating the rulebase and objects with SmartConsole the application crashes and closes immediately. To troubleshoot, you will need to review the crash report. In which directory on the host PC will you find this report?

A.

\data\crash_report\

B.

\data\crash_report\

C.

\data\crash_report

D.

\crash_report\data\

Full Access
Question # 10

The Check Point FW Monitor tool captures and analyzes incoming packets at multiple points in the traffic inspections. Which of the following is the correct inspection flow for traffic?

A.

(i) - pre-inbound, (I) - post-inbound, (o) - pre-outbound, (O) - post-outbound

B.

(o) - pre-outbound, (O) - post-inbound, (i) - pre-inbound, (I) - post-inbound

C.

(O) - post-outbound, (o) - pre-outbound, (I) - post-inbound, (i) - pre-inbound

D.

(1) - pre-inbound, (i) - post-inbound, (O) - pre-outbound, (o) - post-outbound

Full Access
Question # 11

To verify that communication is working between the Security Management Server and the Security Gateway, which service port should be checked?

A.

257

B.

18209

C.

259

D.

19009

Full Access
Question # 12

Running tcpdump causes a significant increase in CPU usage, what other option should you use?

A.

o

B.

O

C.

I

D.

i

Full Access
Question # 13

You tested the connection from source to destination and you are not able to find logs in your Security Management. What is the best possible reason?

A.

The FWM process crashed on Security Management, therefore logging will not work.

B.

There is not enough storage in Security Management, so the logs can't be stored.

C.

The logging blade was not enabled on Security Gateway.

D.

The gateway is logging locally.

Full Access
Question # 14

After deploying a new Static NAT configuration, traffic is not getting through. What command would you use to verify that the proxy ARP configuration has been loaded?

A.

fw ctl conn

B.

fw ctl arp

C.

fw arp ctl

D.

cp ctl arp

Full Access
Question # 15

Which of the following System Monitoring Commands (Linux) shows process resource utilization, as well as CPU and memory utilization?

A.

df

B.

free

C.

ps

D.

top

Full Access
Question # 16

What is the difference between the “Super User" and “Read Write All" SmartConsole permission profiles?

A.

“Read Write All" has the extra ability to make changes within the Gaia operating system

B.

“Super User” has the extra ability to administer other administrative accounts

C.

“Super User” has the extra ability to make changes within the Gaia operating system

D.

“Super User" had the extra ability of being able to use the Management API

Full Access
Question # 17

When running a debug with fw monitor, which parameter will create a more verbose output?

A.

-I

B.

-i

C.

V

D.

-D

Full Access
Question # 18

Where can a Check Point customer find information about product licenses they own, download product manuals, and get information about product support expiration?

A.

Smart Console

B.

PartnerMAP portal

C.

UserCenter portal

D.

In security management server via CLI and executing command cplic print

Full Access
Question # 19

When running the cplic command, what argument is used to show the Signature key?

A.

-x

B.

-rn

C.

-s

D.

-yall

Full Access
Question # 20

What is the name of the Software Blade Package containing CDR (Content Disarm & Reconstruction) and Zero Day protection?

A.

TE - Threat Emulation

B.

SNBT - Sandblast

C.

NGTX - Next Generation Threat Prevention and Extraction

D.

NGTP - Next Generation Threat Prevention

Full Access
Question # 21

Which is the correct "fw monitor" syntax for creating a capture file for loading it into Wireshark?

A.

fw monitor -e "accept Output.cap

B.

This cannot be accomplished as it is not supported with R80.10

C.

fw monitor -e "accept

D.

fw monitor -e "accept

Full Access
Question # 22

Which of the following is true about tcpdump?

A.

The tcpdump can only capture TCP packets and not UDP packets

B.

A tcpdump session can be initiated from the SmartConsole

C.

The tcpdump has to be run from clish mode in Gaia

D.

Running tcpdump without the correct switches will negatively impact the performance of the Firewall

Full Access