Checkpoint 156-582 Exam Questions
Check Point Certified Troubleshooting Administrator - R81.20 (Page 8 )

Updated On: 17-Feb-2026

During a problem isolation with the OSI model, what layer will you investigate when the issue is ARP or MAC address?

  1. Network level
  2. Layer 2
  3. Physical
  4. Layer 3

Answer(s): B

Explanation:

ARP (Address Resolution Protocol) and MAC (Media Access Control) addresses operate at Layer 2 of the OSI model, which is the Data Link Layer. This layer is responsible for node-to-node data transfer and handling MAC addressing. Issues with ARP or MAC addresses indicate problems at this specific layer, necessitating an investigation into Layer 2.



Check Point's self-service knowledge base of technical documents and tools covers everything from articles describing how to fix specific issues, understand error messages and to how to plan and perform product installation and upgrades. This knowledge base is called:

  1. SupportCenterBase
  2. SecureDocs
  3. SupportDocs
  4. SecureKnowledge

Answer(s): D

Explanation:

Check Point's self-service knowledge base is known as SecureKnowledge. It provides a comprehensive repository of technical documents, guides, troubleshooting steps, and tools necessary for managing and resolving issues related to Check Point products. The other options listed are either incorrect or do not represent the official name of Check Point's knowledge base.



Which of the following System Monitoring Commands (Linux) shows process resource utilization, as well as CPU and memory utilization?

  1. df
  2. free
  3. ps
  4. top

Answer(s): D

Explanation:

The top command in Linux provides a real-time, dynamic view of system processes, showing CPU and memory usage among other metrics. It is the most suitable command for monitoring process resource utilization continuously. In contrast, df displays disk space usage, free shows memory usage, and ps provides a snapshot of current processes but without the dynamic, real-time monitoring that top offers.



What file extension should be used with fw monitor to allow the output file to be imported and read in Wireshark?

  1. .pea
  2. .exe
  3. .cap
  4. .tgz

Answer(s): C

Explanation:

The .cap file extension is commonly used for packet capture files that can be imported and analyzed in Wireshark.
When using fw monitor, specifying the output file with a .cap extension ensures compatibility with Wireshark for detailed packet analysis. Other extensions like .exe and .tgz are not suitable for packet captures, and .pea is not a standard extension for this purpose.



How many different types of Service Requests exist?

  1. 4
  2. 2
  3. 3
  4. 5

Answer(s): A

Explanation:

Check Point categorizes Service Requests (SRs) into four main types: Technical Support, Product Enhancement, Billing and Licensing, and Other Services. Each type caters to different aspects of customer needs, ensuring that users can address a wide range of issues and requests through the appropriate channels.






Post your Comments and Discuss Checkpoint 156-582 exam dumps with other Community members:

Join the 156-582 Discussion