[March 1, 2025] Prepare for the 156-587 CCTE Exam with Free Practice Tests
Are you preparing for the 156-587 Check Point Certified Troubleshooting Expert – R81.20 (CCTE) exam? If so, you’re likely looking for study resources to help you ace the test. This certification is designed for professionals who specialize in troubleshooting and maintaining Check Point systems, and it validates your expertise in R81.20 configurations. In this post, we’ll provide an overview of the exam, some sample questions to test your knowledge, and a call to action to help you access more comprehensive study material.
Practice Online 156-587 CCTE Free Questions
1.You run a free-command on a gateway and notice that the Swap column is not zero Choose the best answer
A. Utilization of ram is high and swap file had to be used
B. Swap file is used regularly because RAM memory is reserved for management traffic
C. Swap memory is used for heavy connections when RAM memory is full
D. Its ole Swap is used to increase performance
Answer: A
2.You modified kernel parameters and after rebooting the gateway, a lot of production traffic gets dropped and the gateway acts strangely What should you do”?
A. Run command fw ctl set int fw1_kernel_all_disable=1
B. Restore fwkem.conf from backup and reboot the gateway
C. run fw unloadlocal to remove parameters from kernel
D. Remove all kernel parameters from fwkem.conf and reboot
Answer: B
3.What process monitors terminates, and restarts critical Check Point processes as necessary?
A. CPM
B. FWD
C. CPWD
D. FWM
Answer: C
4.When dealing with monolithic operating systems such as Gaia where are system calls initiated from to achieve a required system level function?
A. Kernel Mode
B. Slow Path
C. Medium Path
D. User Mode
Answer: A
5.Which of the following commands can be used to see the list of processes monitored by the Watch Dog process?
A. cpstat fw -f watchdog
B. fw ctl get str watchdog
C. cpwd_admin list
D. ps -ef | grep watchd
Answer: C
6.What tool would you run to diagnose logging and indexing?
A. run cpm_doctor.sh
B. cpstat mg -f log_server
C. run diagnostic view
D. run doctor-log.sh
Answer: D
7.You found out that $FWDIR/Iog/fw.log is constantly growing in size at a Security Gateway, what is the reason?
A. TCP state logging is enabled
B. Its not a problem the gateways is logging connections and also sessions
C. fw.log can grow when GW does not have space in logging directory
D. The GW is logging locally
Answer: B
8.What is the best way to resolve an issue caused by a frozen process?
A. Power off the machine
B. Restart the process
C. Reboot the machine
D. Kill the process
Answer: D
9.Which of the following file is commonly associated with troubleshooting crashes on a system such as the Security Gateway?
A. tcpdump
B. core dump
C. fw monitor
D. CPMIL dump
Answer: B
10.When a User Mode process suddenly crashes, it may create a core dump file.
Which of the following information is available in the core dump and may be used to identify the root cause of the crash?
i. Program Counter
ii. Stack Pointer
iii. Memory management information
iv. Other Processor and OS flags / information
A. iii and iv only
B. i and ii only
C. i, ii, iii and iv
D. Only lii
Answer: C
11.Where will the usermode core files located?
A. $FWDIRVar/log/dump/usermode
B. /var/suroot
C. /var/log/dump/usermode
D. $CPDIR/var/log/dump/usermode
Answer: D
12.What is the function of the Core Dump Manager utility?
A. To determine which process is slowing down the system
B. To send crash information to an external analyzer
C. To limit the number of core dump files per process as well as the total amount of disk space used by core files
D. To generate a new core dump for analysis
Answer: C
13.What is the proper command for allowing the system to create core files?
A. service core-dump start
B. SFWDIR/scripts/core-dump-enable.sh
C. set core-dump enable
>save config
D. # set core-dump enable
# save config
Answer: C
14.When a user space process or program suddenly crashes, what type of file is created for analysis
A. core dump
B. kernel_memory_dump dbg
C. core analyzer
D. coredebug
Answer: A
15.You receive reports from multiple users that they cannot browse Upon further discovery you identify that Identity Awareness cannot identify the users properly and apply the configuredAccess Roles
What commands you can use to troubleshoot all identity collectors and identity providers from the command line?
A. on the gateway: pdp debug set IDC all IDP all
B. on the gateway: pdp debug set AD all and IDC all
C. on the management: pdp debug on IDC all
D. on the management: pdp debug set all
Answer: A
To better prepare for the real test, we recommend diving into more detailed practice exams and study guides. You can access the full version of these resources here.
LEAVE A COMMENT