2022年最新の156-585試験問題集で最近更新された116問題
CheckPoint 156-585リアル2022年最新のブレーン問題集で模擬試験問題集
CheckPoint 156-585 認定試験の出題範囲:
トピック | 出題範囲 |
---|---|
トピック 1 |
|
トピック 2 |
|
トピック 3 |
|
トピック 4 |
|
トピック 5 |
|
質問 53
What is the kernel process for Content Awareness that collects the data from the contexts received from the CMI and decides if the file is matched by a data type?
- A. cntawmod
- B. cntmgr
- C. dlpda
- D. dlpu
正解: A
質問 54
RAD is initiated when Application Control and URL Filtering blades are active on the Security Gateway What is the purpose of the following RAD configuration file SFWDIR/conf/rad_settings.C?
- A. This file contains all the host name settings for the online application detection engine
- B. This file contains the information on how the Security Gateway reaches the Security Managers RAD service for Application Control and URL Filtering
- C. This file contains RAD proxy settings
- D. This file contains the location information tor Application Control and/or URL Filtering entitlements
正解: B
質問 55
Which of the following is contained in the System Domain of the Postgres database?
- A. Trusted GUI clients
- B. Configuration data of log servers
- C. Saved queries for applications
- D. User modified configurations such as network objects
正解: A
質問 56
Some users from your organization have been reported some connection problems with CIFS since this morning. You suspect an IPS Issue after an automatic IPS update last night. So you want to perform a packet capture on uppercase I only directly after the IPS module (position 4 in the chain) to check if the packets pass the IPS. What command do you need to run?
- A. tcpdump -eni any <filterexpression>
- B. fw monitor -pl asm <filterexpression>
- C. fw monitor -ml -pl 5 -e <filterexpression>
- D. fw monitor -pi 5 -e <filterexpression>
正解: C
質問 57
Which of the following is contained in the System Domain of the Postgres database?
- A. Configuration data of log servers
- B. Saved queries for applications
- C. User modified configurations such as network objects
- D. Trusted GUI clients
正解: C
質問 58
What acceleration mode utlizes multi-core processing to assist with traffic processing?
- A. CoreXL
- B. SecureXL
- C. HyperThreading
- D. Traffic Warping
正解: C
質問 59
What is the correct syntax to set all debug flags for Unified Policy related issues?
- A. fw ctl debug -m fw all
- B. fw ctl debug -m UP all
- C. fw ctl kdebug -m UP all
- D. fw ctl debug -m up all
正解: B
質問 60
the difference in debugging a S2S or C2S (using Check Point VPN Client) VPN?
- A. there is no difference
- B. the C2S VPN can not be debugged as it uses different protocols for the key exchange
- C. the C2S VPN uses a different VPN deamon and there a second VPN debug
- D. the C2S client uses Browser based SSL vpn and cant be debugged
正解: D
質問 61
What command is usually used for general firewall kernel debugging andwhatis the sizeofthe buffer that isautomaticallyenabled whenusingthe command?
- A. fw ctl debug, buffer sizeis 1024 KB
- B. fw ctl kdeoug. buffer sizeis 32000 KB
- C. fw ell zdebug. buffer size is 32768 KB
- D. fw dl zdebug, buffer size is 1 MB
正解: B
質問 62
What are the main components of Check Point's Security Management architecture?
- A. Management server, management database, log server, automation server
- B. Management server Log server, Gateway server. Security server
- C. Management server, Security Gateway. Multi-Domain Server, SmartEvent Server
- D. Management Server. Log Server. LDAP Server, Web Server
正解: A
質問 63
What is the function of the Core Dump Manager utility?
- A. To determine which process is slowing down the system
- B. To generate a new core dump for analysis
- C. To send crash information to an external analyzer
- D. To limit the number of core dump files per process as well as the total amount of disk space used by core files
正解: D
質問 64
Which process is responsible for the generation of certificates?
- A. dbsync
- B. cpca
- C. fwm
- D. cpm
正解: B
質問 65
Check Point Threat Prevention policies can contain multiple policy layers and each layer consists of its own Rule Base Which Threat Prevention daemon is used for Anti-virus?
- A. in.msd
- B. ctasd
- C. in emaild
- D. in.emaild.mta
正解: C
質問 66
If IPS protections that prevent SecureXL from accelerating traffic, such as Network Quota, Fingerprint Scrambling. TTL Masking etc, have to be used, what is a recommended practice to enhance the performance of the gateway?
- A. Disable all such protections
- B. Disable SecureXL and use CoreXL
- C. Upgrade the hardware to include more Cores and Memory
- D. Use the IPS exception mechanism
正解: B
質問 67
When a User Mode process suddenly crashes it may create a core dump file. Which of the following information is available in the core dump and may be used to identify the root cause of the crash?
i Program Counter
ii Stack Pointer
ii. Memory management information
iv Other Processor and OS flags / information
- A. i, ii, lii and iv
- B. i and n only
- C. iii and iv only
- D. D Only iii
正解: C
質問 68
What is connect about the Resource Advisor (RAD) service on the Security Gateways?
- A. RAD has a kernel module that looks up the kernel cache, notifies client about hits and misses andforwards a-sync requests to RADuser space module which is responsible for online categorization
- B. RAD is completely loaded as a kernel module that looks up URL in cache and if not found connects online for categorization There isno user space involvement in this process
- C. RAD is not a separate module, it is an integrated function of the 'fw1 kernel module and does all operations in the kernel space
- D. RAD functions completely in user space The Pattern Matter (PM) module ofthe CMI looks up for URLs in the cache and if not found, contact the RAD process inuser space to do online categorization
正解: D
質問 69
What is the correct syntax to turn a VPN debug on and create new empty debug files?
- A. vpndebug trunc on
- B. vpn debug truncon
- C. vpn debug trunkon
- D. vpn kdebug on
正解: C
質問 70
Which command can be run in Expert mode to verify the core dump settings?
- A. grep $FWDIR/config/db/initial
- B. cat /etc/sysconfig/coredump/cdm.conf
- C. grep cdm /config/db/initial
- D. grep cdm /config/db/coredump
正解: A
質問 71
You need to run a kernel debug over a longer period of time as the problem occurs only once or twice a week. Therefore you need to add a timestamp to the kernel debug and write the output to a file What is the correct syntax for this?
- A. fw ctl kdebug -T > filename.debug
- B. fw ctl kdebug -T -f > filename.debug
- C. fw ctl kdebug -T -f -o filename.debug
- D. fw ctl debug -T -f > filename.debug
正解: D
質問 72
Which of the following is NOT a valid "fwaccel" parameter?
- A. stat
- B. stats
- C. packets
- D. templates
正解: C
質問 73
......
厳密検証された156-585試験問題集と解答で無料提供の156-585問題と正解付き:https://www.jpntest.com/shiken/156-585-mondaishu