What is the function of the Core Dump Manager utility?
What is the function of the Core Dump Manager utility?A . To generate a new core dump for analysisB . To limit the number of core dump files per process as well as the total amount of disk space used by core filesC . To determine which process is slowing...
What table does the command "fwaccel conns" pull information from?
What table does the command "fwaccel conns" pull information from?A . fwxl_connsB . SecureXLConC . cphwd_dbD . sxl_connectionsView AnswerAnswer: C
Which of the following daemons is used for Threat Extraction?
Which of the following daemons is used for Threat Extraction?A . scrubdB . extractdC . texD . tedexView AnswerAnswer: A
Which of the following daemons is used for Threat Extraction?
Which of the following daemons is used for Threat Extraction?A . scrubdB . extractdC . texD . tedexView AnswerAnswer: A
What are the four ways to insert an FW Monitor into the firewallkernel chain?
What are the four ways to insert an FW Monitor into the firewallkernel chain?A . Relative position using location, relativepositionusing alias, absolute position, all positionsB . Absolute position using location, absolute position using alias, relative position, all positionsC . Absolute position using location, relative position using alias, general position, all...
Which process is responsible for the generation of certificates?
Which process is responsible for the generation of certificates?A . cpmB . cpcaC . dbsyncD . fwmView AnswerAnswer: B
Which of the following information is available in the core dump and may be used to identify the root cause of the crash?
When a User Mode process suddenly crashes it may create a core dump file. Which of the following information is available in the core dump and may be used to identify the root cause of the crash? i Program Counter ii Stack Pointer ii. Memory management information iv Other Processor...
the difference in debugging a S2S or C2S (using Check Point VPN Client) VPN?
the difference in debugging a S2S or C2S (using Check Point VPN Client) VPN?A . there is no differenceB . the C2S VPN uses a different VPN deamon and there a second VPN debugC . the C2S VPN can not be debugged as it uses different protocols for the key...
What is the buffer size set by the fw ctl zdebug command?
What is the buffer size set by the fw ctl zdebug command?A . 1 MBB . 1 GBC . 8MBD . 8GBView AnswerAnswer: A
Which directory is used for the Malware database?
Rules within the Threat Prevention policy use the Malware database and network objects. Which directory is used for the Malware database?A . $FWDIR/conf/install_manager_tmp/ANTIMALWARE/conf/B . $CPDIR/conf/install_manager_lmp/ANTIMALWARE/conf/C . $FWDlR/conf/install_firewall_imp/ANTIMALWARE/conf/D . $FWDlR/log/install_manager_tmp/ANTIMALWARBlog?View AnswerAnswer: A