You were asked by security team to debug Mobile Access VPN. What processes will you debug?
You receive reports that Users cannot browse internet sites. You are using identity awareness with AD Query and Identity Collector in addition you have the Browser Based Authentication Enabled. What command can be used to debug the problem?
You need to monitor traffic pre-inbound and before the VPN module in a Security Gateway. How would you achieve this using fw monitor?
What is the correct syntax to turn a VPN debug on and create new empty debug files'?
In the Security Management Architecture, what port and process does SmartConsole use to communicate with the Security Management Server?
Like a Site-to-Site VPN between two Security Gateways, a Remote Access VPN relies on the Internet Key Exchange (IKE) what types of keys are generated by IKE during negotiation?
PostgreSQL is a powerful, open source relational database management system. Check Point offers a command for viewing the database to interact with Postgres interactive shell. Which command do you need to enter the PostgreSQL interactive shell?
Which kernel process is used by Content Awareness to collect the data from contexts?
What is the correct syntax to set all debug flags for Unified Policy related issues?
What is the kernel process for Content Awareness that collects the data from the contexts received from the CMI and decides if the file is matched by a data type?
Check Point provides tools & commands to help you to identify issues about products and applications. Which Check Point command can help you to display status and statistics information for various Check Point products and applications?
Which of these packet processing components stores Rule Base matching state-related information?
When viewing data for CPMI objects in the Postgres database, what table column should be selected to query for the object instance?
SmartEvent utilizes the Log Server, Correlation Unit and SmartEvent Server to aggregate logs and identify security events. The three main processes that govern these SmartEvent components are:
URL Filtering is an essential part of Web Security in the Gateway. For the Security Gateway to perform a URL lookup when a client makes a URL request, where is the sync-request forwarded from if a sync-request is required?
Which of the following file is commonly associated with troubleshooting crashes on a system such as the Security Gateway?
Check Point Access Control Daemons contains several daemons for Software Blades and features. Which Daemon is used for Application & Control URL Filtering?
You found out that $FWDIR/Iog/fw.log is constantly growing in size at a Security Gateway, what is the reason?
What command is usually used for general firewall kernel debugging and what is the size of the buffer that is automatically enabled when using the command?