Which of the following commands can be used to see the list of processes monitored by the Watch Dog process?
You were asked by security team to debug Mobile Access VPN. What processes will you debug?
You modified kernel parameters and after rebooting the gateway, a lot of production traffic gets dropped and the gateway acts strangely What should you do"?
When viewing data for CPMI objects in the Postgres database, what table column should be selected to query for the object instance?
You need to run a kernel debug over a longer period of time as the problem occurs only once or twice a week. Therefore you need to add a timestamp to the kernel debug and write the output to a file
but you cant afford to fill up all the remaining disk space and you only have 10 GB free for saving the debugs What is the correct syntax for this?
URL Filtering is an essential part of Web Security in the Gateway. For the Security Gateway to perform a URL lookup when a client makes a URL request, where is the sync-request forwarded from if a sync-request is required?
During firewall kernel debug with fw ctl zdebug you received less information that expected. You noticed that a lot of messages were lost since the time the debug was started. What should you do to
resolve this issue?
In Check Point's Packet Processing Infrastructure what is the role of Observers?
You receive reports that Users cannot browse internet sites. You are using identity awareness with AD Query and Identity Collector in addition you have the Browser Based Authentication Enabled. What command can be used to debug the problem?
What is the correct syntax to turn a VPN debug on and create new empty debug files'?
Which of the following file is commonly associated with troubleshooting crashes on a system such as the Security Gateway?
Check Point Access Control Daemons contains several daemons for Software Blades and features. Which Daemon is used for Application & Control URL Filtering?
What is the simplest and most efficient way to check all dropped packets in real time?
The Unified Access Control policy eliminates the need to maintain policies for different access control features However, you need to start a general debug of the Unified Policy with all flags turned on Which of the following is the correct syntax?
You are using the identity Collector with identity Awareness in large environment. Users report that they cannot access resources on Internet You identify that the traffic is matching the cleanup rule
Instead of the proper rule with Access Roles using the IDC How can you check if IDC is working?
Which of these packet processing components stores Rule Base matching state-related information?
When dealing with monolithic operating systems such as Gaia where are system calls initiated from to achieve a required system level function?
What is correct about the Resource Advisor (RAD) service on the Security Gateways?
How can you start debug of the Unified Policy with all possible flags turned on?
When a User Mode process suddenly crashes, it may create a core dump file. Which of the following information is available in the core dump and may be used to identify the root cause of the crash?
i. Program Counter
ii. Stack Pointer
iii. Memory management information
iv. Other Processor and OS flags / information