Test Online Free Check Point 156-585 Exam Questions and Answers

The questions for 156-585 were last updated On Oct.23 2021

Get 156-585 Full Access
 / 2

Question No : 1
Check Point Access Control Daemons contains several daemons for Software Blades and features.
Which Daemon is used for Application & Control URL Filtering?

Answer:

Question No : 2
1.What command is used to find out which port Multi-Portal has assigned to the Mobile Access Portal?

Answer:

Question No : 3
Jenna has to create a VPN tunnel to a CISCO ASA but has to set special property to renegotiate the Phase 2 tunnel after 10 MB of transferee1 data.
This can not be configured in the smart console, so how can she modify this property?

Answer:

Question No : 4
Which of the following is NOT a valid "fwaccel" parameter?

Answer:
Explanation:
Reference: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk41397

Question No : 5
When a User process or program suddenly crashes, a core dump is often used to examine the problem.
Which command is used to enable the core-dumping via GAIA dish?

Answer:

Question No : 6
The client sends an a-sync request back to RAD If the URL was not found.

Answer:

Question No : 7
The management configuration stored in the Postgres database is partitioned into several relational database Domains, like - System, User, Global and Log Domains. The User Domain stores the network objects and security policies.
Which of the following is stored in the Log Domain?

Answer:

Question No : 8
Joey is configuring a site-to-site VPN with his business partner. On Joey’s site he has a Check Point R80.10 Gateway and his partner uses Cisco ASA 5540 as a gateway.
Joey’s VPN domain on the Check Point Gateway object is manually configured with a group object that contains two network objects:
VPN_Domain3 = 192.168.14.0/24
VPN_Domain4 = 192.168.15.0/24
Partner’s site ACL as viewed from “show run”
access-list JOEY-VPN extended permit ip 172.26.251.0 255.255.255.0 192.168.14.0 255.255.255.0
access-list JOEY-VPN extended permit ip 172.26.251.0 255.255.255.0 192.168.15.0 255.255.255.0
When they try to establish VPN tunnel, it fails .
What is the most likely cause of the failure given the information provided?

Answer:

Question No : 9
The two procedures available for debugging in the firewall kernel are
i fw ctl zdebug
ii fw ctl debug/kdebug
Choose the correct statement explaining the differences in the two

Answer:

Question No : 10
When debugging is enabled on firewall kernel module using the ‘fw ctl debug’ command with required options, many debug messages are provided by the kernel that help the administrator to identify issues .
Which of the following is true about these debug messages generated by the kernel module?

Answer:

 / 2
  TOP 50 Exam Questions
Exam