Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

156-582 Check Point Certified Troubleshooting Administrator - R81.20 (CCTA) Questions and Answers

Questions 4

The URL filtering cache limit exceeded. What issues can this cause?

Options:

A.

When URL filtering cache exceeds the limit, it will be disabled temporarily to overcome instability of the system

B.

RAD process will spawn multiple times to help populate the cache

C.

Resource Advisor (RAD) process on the Security Gateway consumes close to 100 percent of the CPU

D.

Nothing, the Security Gateway dynamically raises the cache when needed

Buy Now
Questions 5

Which of the following System Monitoring Commands (Linux) shows process resource utilization, as well as CPU and memory utilization?

Options:

A.

df

B.

free

C.

ps

D.

top

Buy Now
Questions 6

Where would you look to find the error log file to investigate a logging issue on the Security Management Server?

Options:

A.

SFWDIR/log/fwd.elg

B.

SCPDIR/log/cpd.elg

C.

SMDS_FWDIR/log/cpm.elg

D.

SFWDIR/log/fwm.elg

Buy Now
Questions 7

What Check Point process controls logging?

Options:

A.

CPWD

B.

FWD

C.

CPD

D.

CPM

Buy Now
Questions 8

Check Point provides tools & commands to help you identify issues about products and applications. Which Check Point command can help you display status and statistics information for various Check Point products and applications?

Options:

A.

cpstat

B.

CP-stat

C.

CPview

D.

fwstat

Buy Now
Questions 9

What is the difference between the “Super User" and “Read Write All" SmartConsole permission profiles?

Options:

A.

“Read Write All" has the extra ability to make changes within the Gaia operating system

B.

“Super User” has the extra ability to administer other administrative accounts

C.

“Super User” has the extra ability to make changes within the Gaia operating system

D.

“Super User" had the extra ability of being able to use the Management API

Buy Now
Questions 10

As a security administrator/engineer in your company, you have noticed that your HQ Check Point Security Management Server is not receiving logs from your HQ Check Point Gateway/Cluster. To investigate this issue in the command line, you will need to verify which process is running?

Options:

A.

cpm

B.

cpd

C.

fwd

D.

fwm

Buy Now
Questions 11

You were asked to set up logging for a rule to log a full list of URLs when the rule hits in the Rule Base. How do you accomplish that?

Options:

A.

Set Extended logging under rule log type

B.

Click on the rule, column logging and set "log URL" under application control blade layer

C.

All URLs are logged by default

D.

For URL logging you need to modify blade settings of URL filtering blade under SmartConsole, Manage & Settings, blades, URL filtering

Buy Now
Questions 12

You need to switch the active log file on the Security Gateway. What is the correct command?

Options:

A.

fw -p -o switch

B.

fw logswitch

C.

Install security policy

D.

fw switchlog

Buy Now
Questions 13

What is the port for the Log Collection on Security Management Server?

Options:

A.

18191

B.

443

C.

258

D.

257

Buy Now
Questions 14

In the Security Management Architecture, what port and process SmartConsole uses to communicate with the management server?

Options:

A.

CPM 19009 and 18191

B.

CPM and 18190

C.

CPM and 19009

D.

FWM and 19009

Buy Now
Questions 15

Which Layer of the OSI Model is responsible for routing?

Options:

A.

Network

B.

Transport

C.

Session

D.

Data link

Buy Now
Questions 16

For Threat Prevention, which process is enabled when the Policy Conversion process has debug turned on using the INTERNAL_POLICY_LOADING=1 command?

Options:

A.

fwm

B.

cpm

C.

solr

D.

dlpd

Buy Now
Questions 17

How would you check the connection status of a gateway to the Log server?

Options:

A.

Run netstat -anp | grep :257 in CLISH on Log server

B.

Run netstat -anp | grep :257 in expert mode on Log server

C.

Run netstat -anp | grep :18187 in expert mode on Log server

D.

Run netstat -anp | grep :18187 in CLISH on Log server

Buy Now
Questions 18

After manipulating the rulebase and objects with SmartConsole the application crashes and closes immediately. To troubleshoot, you will need to review the crash report. In which directory on the host PC will you find this report?

Options:

A.

\data\crash_report\

B.

\data\crash_report\

C.

\data\crash_report

D.

\crash_report\data\

Buy Now
Questions 19

Where can a Check Point customer find information about product licenses they own, download product manuals, and get information about product support expiration?

Options:

A.

Smart Console

B.

PartnerMAP portal

C.

UserCenter portal

D.

In security management server via CLI and executing command cplic print

Buy Now
Questions 20

Which of the following is a valid way to capture packets on Check Point gateways?

Options:

A.

Firewall logs

B.

Wireshark

C.

tcpdump

D.

Network taps

Buy Now
Questions 21

What is the default protection profile for Autonomous Threat Prevention?

Options:

A.

Perimeter

B.

Guest

C.

Internal

D.

Bypass

Buy Now
Questions 22

Which is the correct "fw monitor" syntax for creating a capture file for loading it into Wireshark?

Options:

A.

fw monitor -e "accept Output.cap

B.

This cannot be accomplished as it is not supported with R80.10

C.

fw monitor -e "accept

D.

fw monitor -e "accept

Buy Now
Exam Code: 156-582
Exam Name: Check Point Certified Troubleshooting Administrator - R81.20 (CCTA)
Last Update: Oct 15, 2025
Questions: 75

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99