Winter Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

156-587 Questions and Answers

Question # 6

What is the function of the Core Dump Manager utility?

A.

To determine which process is slowing down the system

B.

To send crash information to an external analyzer

C.

To limit the number of core dump files per process as well as the total amount of disk space used by core files

D.

To generate a new core dump for analysis

Full Access
Question # 7

What clicommand is run on the GW to verifycommunication to the identity Collector?

A.

pdp connections idc

B.

pep connections idc

C.

show idc connections

D.

fwd connected

Full Access
Question # 8

What is the benefit of fw ctl debug over fw ctl zdebug?

A.

There is no difference Both are used for debugging kernel

B.

You don't need timestamps

C.

It allows you to debug multiple modules at the same time

D.

You only need 1MB buffer

Full Access
Question # 9

Troubleshooting issues with Mobile Access requires the following:

A.

'ma_vpnd' process on Security Gateway

B.

Debug logs of FWD captured with the command - ‘fw debug fwd on TDERROR_MOBILE_ACCESS=5'

C.

Standard VPN debugs, packet captures and debugs of cvpnd1 process on Security Gateway

D.

Standard VPN debugs and packet captures on Security Gateway, debugs of 'cvpnd' process on Security Management

Full Access
Question # 10

What is the correct syntax to set all debug flags for Unified Policy related issues?

A.

fw ctl kdebug-m UP all

B.

fw ctl debug-m UP all

C.

fw ctl debug -m up all

D.

fw ctl debug -m fw all

Full Access
Question # 11

When debugging is enabled on firewall kernel module using the fw ctl debug' command with required options, many debug messages are provided by the kernel that help the administrator to identify

Issues. Which of the following is true about these debug messages generated by the kernel module?

A.

Messages are written to /etc/dmesg file

B.

Messages are written to a buffer and collected using ‘fw ctl kdebug

C.

Messages are written to SFWDIR

D.

Messages are written to console and also /var/log/messages file

Full Access
Question # 12

What tool would you run to diagnose logging and indexing?

A.

run cpm_doctor.sh

B.

cpstat mg -f log_server

C.

run diagnostic view

D.

run doctor-log.sh

Full Access
Question # 13

When a User Mode process suddenly crashes,it may create a core dump file.Which of the following information is available in the core dump and may be used to identify the root cause of the crash?

i. Program Counter

ii. Stack Pointer

iii. Memory management information

iv. Other Processor and OS flags / information

A.

iii and iv only

B.

i and ii only

C.

i, ii, iii and iv

D.

Only lii

Full Access
Question # 14

You found out that $FWDIR/Iog/fw.log is constantly growing in size at a Security Gateway, what is the reason?

A.

TCP state logging is enabled

B.

Its not a problem the gateways is logging connections and also sessions

C.

fw.log can grow when GW does not have space in logging directory

D.

The GW is logging locally

Full Access
Question # 15

An administrator receives reports about issues with log indexing and text searching regarding an existing Management Server. In trying to find a solution she wants to check if the process responsible for this feature is running correctly. What is true about the related process?

A.

cpd needs to be restarted manual to show in the list

B.

fwm manaqes this database after initialization of the 1CA

C.

solr is a child process of cpm

D.

fwssd crashes can affect therefore not show in the list

Full Access
Question # 16

What is the most efficient way to read an IKEv2 Debug?

A.

IKEview

B.

vi on the cti

C.

notepad++

D.

any xml editor

Full Access
Question # 17

What file contains the RAD proxy settings?

A.

rad_control.C

B.

rad_scheme.C

C.

rad_services.C

D.

rad_settings.C

Full Access
Question # 18

You are seeing outputfrom the previous kernel debug.What command should you use to avoid that?

A.

fw ctl clean buffer = 0

B.

fw ctl debug 0

C.

fw ctl zdebug disable

D.

fw ctl debug = 0

Full Access
Question # 19

When a User process or program suddenly crashes, a core dump is often used to examine the problem Which command is used to enable the core-dumping via GAIA clish?

A.

set core-dump enable

B.

set core-dump total

C.

set user-dump enable

D.

set core-dump per_process

Full Access
Question # 20

What component is NOT part of Unified policy manager?

A.

Classifier

B.

CMI

C.

Handle

D.

Observer

Full Access
Question # 21

What function receives theAD log event information?

A.

FWD

B.

CPD

C.

PEP

D.

ADLOG

Full Access
Question # 22

Which of the following commands can be used to see the list of processes monitored by the Watch Dog process?

A.

cpstat fw -f watchdog

B.

fw ctl get str watchdog

C.

cpwd_admin list

D.

ps -ef | grep watchd

Full Access
Question # 23

In Mobile Access VPN. clientless access is done using a web browser. The primary communication path for these browser based connections is a process that allows numerous processes to utilize port

443 and redirects traffic to a designated port of the respective process Which daemon handles this?

A.

Multi-portal Daemon (MPD)

B.

Mobile Access Daemon (MAD)

C.

HTTPS Inspection Daemon (HID)

D.

Connectra VPN Daemon (cvpnd)

Full Access