Decide Fast & Get 50% Flat Discount | Limited Time Offer - Ends In 0d 00h 00m 00s Coupon code: SAVE50

Master CheckPoint 156-587 Exam with Reliable Practice Questions

Page: 1 out of Viewing questions 1-5 out of 78 questions
Last exam update: Feb 09,2025
Upgrade to Premium
Question 1

Check Point Access Control Daemons contains several daemons for Software Blades and features. Which Daemon is used for Application & Control URL Filtering?


Correct : B


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 2

Packet processing infrastructure consists of the following components EXCEPT:


Correct : C


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 3

What does CMI stand for in relation to the Access Control Policy?


Correct : B

CMI stands for Context Management Infrastructure, which is a component of the Access Control Policy that enables the Security Gateway to inspect traffic based on the context of the connection. Context includes information such as user identity, application, location, time, and device. CMI allows the Security Gateway to apply different security rules and actions based on the context of the traffic, and to dynamically update the context as it changes. CMI consists of three main elements: Unified Policy, Identity Awareness, and Content Awareness.


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 4

What is the kernel process for Content Awareness that collects the data from the contexts received from the CMI and decides if the file is matched by a data type?


Correct : A


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 5

What is correct about the Resource Advisor (RAD) service on the Security Gateways?


Correct : D

The Resource Advisor (RAD) service on the Security Gateways is responsible for online categorization of URLs and resources for Application Control and Threat Prevention blades. RAD has two components: a kernel module and a user space module. The kernel module looks up the kernel cache for URLs and resources, notifies the client about hits and misses, and forwards asynchronous requests to the user space module. The user space module handles the communication with the Check Point online web service and updates the kernel cache with the results. RAD can operate in three modes: hold, background, and custom, depending on the configuration of the blades and the policy.Reference:

Check Point Processes and Daemons- Section: Security Gateway Software Blades and Features - Subsection: URL Filtering Blade

Solved: Re: RAD's high utilization- Post by @PhoneBoy

Check Point Certified Troubleshooting Expert (CCTE)- Exam Topics - Module 5: Advanced Access Control


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500