What is the function of the Core Dump Manager utility?

What is the function of the Core Dump Manager utility?A . To generate a new core dump for analysisB . To limit the number of core dump files per process as well as the total amount of disk space used by core filesC . To determine which process is slowing...

September 21, 2021 No Comments READ MORE +

What table does the command "fwaccel conns" pull information from?

What table does the command "fwaccel conns" pull information from?A . fwxl_connsB . SecureXLConC . cphwd_dbD . sxl_connectionsView AnswerAnswer: C

September 20, 2021 2 Comments READ MORE +

Which of the following daemons is used for Threat Extraction?

Which of the following daemons is used for Threat Extraction?A . scrubdB . extractdC . texD . tedexView AnswerAnswer: A

September 20, 2021 No Comments READ MORE +

Which of the following daemons is used for Threat Extraction?

Which of the following daemons is used for Threat Extraction?A . scrubdB . extractdC . texD . tedexView AnswerAnswer: A

September 20, 2021 No Comments READ MORE +

What are the four ways to insert an FW Monitor into the firewallkernel chain?

What are the four ways to insert an FW Monitor into the firewallkernel chain?A . Relative position using location, relativepositionusing alias, absolute position, all positionsB . Absolute position using location, absolute position using alias, relative position, all positionsC . Absolute position using location, relative position using alias, general position, all...

September 19, 2021 No Comments READ MORE +

Which process is responsible for the generation of certificates?

Which process is responsible for the generation of certificates?A . cpmB . cpcaC . dbsyncD . fwmView AnswerAnswer: B

September 19, 2021 No Comments READ MORE +

Which of the following information is available in the core dump and may be used to identify the root cause of the crash?

When a User Mode process suddenly crashes it may create a core dump file. Which of the following information is available in the core dump and may be used to identify the root cause of the crash? i Program Counter ii Stack Pointer ii. Memory management information iv Other Processor...

September 19, 2021 No Comments READ MORE +

the difference in debugging a S2S or C2S (using Check Point VPN Client) VPN?

the difference in debugging a S2S or C2S (using Check Point VPN Client) VPN?A . there is no differenceB . the C2S VPN uses a different VPN deamon and there a second VPN debugC . the C2S VPN can not be debugged as it uses different protocols for the key...

September 18, 2021 No Comments READ MORE +

What is the buffer size set by the fw ctl zdebug command?

What is the buffer size set by the fw ctl zdebug command?A . 1 MBB . 1 GBC . 8MBD . 8GBView AnswerAnswer: A

September 18, 2021 No Comments READ MORE +

Which directory is used for the Malware database?

Rules within the Threat Prevention policy use the Malware database and network objects. Which directory is used for the Malware database?A . $FWDIR/conf/install_manager_tmp/ANTIMALWARE/conf/B . $CPDIR/conf/install_manager_lmp/ANTIMALWARE/conf/C . $FWDlR/conf/install_firewall_imp/ANTIMALWARE/conf/D . $FWDlR/log/install_manager_tmp/ANTIMALWARBlog?View AnswerAnswer: A

September 18, 2021 No Comments READ MORE +