What is correct about the Resource Advisor (RAD) service on the Security Gateways?
What is correct about the Resource Advisor (RAD) service on the Security Gateways?A . RAD functions completely in user space. The Pattern Matter (PM) module of the CMI looks up for URLs in the cache and if not found, contact the RAD process in user space to do online categorizationB...
What is the column "STAT" used for?
The Check Point Watch Daemon (CPWD) monitors critical Check Point processes, terminating them or restarting them as needed to maintain consistent, stable operating conditions. When checking the status/output of CPWD you are able to see some columns like APP, PID, STAT, START, etc. What is the column "STAT" used for?A...
What does CMI stand for in relation to the Access Control Policy?
What does CMI stand for in relation to the Access Control Policy?A . Content Management InterfaceB . Content Matching InfrastructureC . Context Manipulation InterfaceD . Context Management InfrastructureView AnswerAnswer: D
What should you do to resolve this issue?
During firewall kernel debug with fw ctl zdebug you received less information that expected. You noticed that a lot of messages were lost since the time the debug was started. What should you do to resolve this issue?A . Increase debug buffer; Use fw ctl debug -buf 32768B . Redirect...
Which of these packet processing components stores Rule Base matching state-related information?
Which of these packet processing components stores Rule Base matching state-related information?A . ObserversB . ClassifiersC . ManagerD . HandlersView AnswerAnswer: D
Which command displays information about resource utilization for running processes and shows additional information for core utilization and memory?
In some scenarios it is very helpful to use advanced Linux commands for troubleshooting purposes. Which command displays information about resource utilization for running processes and shows additional information for core utilization and memory?A . topB . vmstatC . cptopD . mpstatView AnswerAnswer: A
What command(s) will turn off all vpn debug collection?
What command(s) will turn off all vpn debug collection?A . fw ctl debug 0B . vpn debug -a offC . vpn debug offD . vpn debug off and vpn debug ikeoffView AnswerAnswer: D
What command is used to find out which port Multi-Portal has assigned to the Mobile Access Portal?
What command is used to find out which port Multi-Portal has assigned to the Mobile Access Portal?A . mpclient getdata sslvpnB . netstat getdata sslvpnC . netstat -nap | grep mobileD . mpclient getdata mobiView AnswerAnswer: A
That is the proper command for allowing the system to create core files?
That is the proper command for allowing the system to create core files?A . $FWDIR/scripts/core-dump-enable.shB . # set core-dump enable # save configC . > set core-dump enable > save configD . service core-dump startView AnswerAnswer: C
Which of the following is contained in the System Domain of the Postgres database?
Which of the following is contained in the System Domain of the Postgres database?A . Trusted GUI clientsB . Configuration data of log serversC . Saved queries for applicationsD . User modified configurations such as network objectsView AnswerAnswer: A