Which kernel debug flag should you use to troubleshoot NAT connections?
Which kernel debug flag should you use to troubleshoot NAT connections?A . fw ctl debug + xlate xltrc nat tableB . fw ctl debug + xltrc xlate nat connC . fw ctl debug + xlate xltrc nat conn dropD . fw ctl debug + fwx_alloc nat conn dropView AnswerAnswer: C
How often will a gateway with Performance Pack running by default automatically review and distribute interface affinity between cores?
How often will a gateway with Performance Pack running by default automatically review and distribute interface affinity between cores?A . Every 60 secondsB . Interface affinity is determined at gateway build time and does not changeC . Every 5 minutesD . Every 10 secondsView AnswerAnswer: A Explanation: Reference: https://sc1.checkpoint.com/documents/R76/ CP_R76_PerformanceTuning_WebAdmin/6731.htm
What mechanism can be used to confirm that important traffic such as control connections are not dropped?
Consider a Check Point Security Gateway under high load. What mechanism can be used to confirm that important traffic such as control connections are not dropped?A . fw debug fgd50 on OPSEC_DEBUG_LEVEL=3B . fw ctl multik prioqC . fgate Cd loadD . fw ctl debug Cm fg allView AnswerAnswer: A
How can he solve the problem?
Joey’s implementing a new R80.10 firewall cluster into the network. During the implementation he notices that the cluster object is in error state in SmartConsole. He tries to figure out the cause of the problem and runs a ClusterXL kernel debug with command: ‘fw ctl debug Cm cluster + stat...
Which of the following is not one of the relational database domains that stores the management configuration?
Which of the following is not one of the relational database domains that stores the management configuration?A . User DomainB . System DomainC . Global DomainD . Audit DomainView AnswerAnswer: D
Fill in the blank. The tool ____________________ generates a R80 Security Gateway configuration report.
Fill in the blank. The tool ____________________ generates a R80 Security Gateway configuration report.A . infoCPB . infoviewC . cpinfoD . fw cpinfoView AnswerAnswer: C
What must be done for the “fw monitor” command to capture packets through the firewall kernel?
What must be done for the “fw monitor” command to capture packets through the firewall kernel?A . SecureXL must be disabledB . ClusterXL must be temporarily disabledC . Firewall policy must be re-installedD . The output file must be transferred to a machine with WireSharkView AnswerAnswer: A Explanation: Reference: https://supportcenter.checkpoint.com/supportcenter/portal?...
Which command would you use to check CoreXL instances for IPv6 traffic?
Which command would you use to check CoreXL instances for IPv6 traffic?A . fwaccel6 statsB . fwaccel6 statC . fw ctl multik statD . fw6ctl multik statView AnswerAnswer: C
What is the correct command to turn off an IKE debug?
What is the correct command to turn off an IKE debug?A . vpn debug ikeoffB . fw ctl debug ikeoffC . vpn debug ikeoff 0D . fw ctl vpn debug ikeoffView AnswerAnswer: A Explanation: Reference: https://community.checkpoint.com/docs/DOC-3023-vpn-troubleshooting-commands
Which command is used to enable IPv6 on Security Gateway?
Which command is used to enable IPv6 on Security Gateway?A . set ipv6-state onB . add ipv6 interface onC . set ipv6-enable onD . set ipv6-state enabledView AnswerAnswer: A