What is the Security Gateway directory where an administrator can find vpn debug log files generated during Site-to-Site VPN troubleshooting?

What is the Security Gateway directory where an administrator can find vpn debug log files generated during Site-to-Site VPN troubleshooting?A . /opt/CPsuiteR80/vpn/log/B . $FWDIR/conf/C . $FWDIR/log/D . $CPDIR/conf/View AnswerAnswer: C

December 14, 2023 No Comments READ MORE +

What is the name of the VPN kernel process?

What is the name of the VPN kernel process?A . FWKB . VPNDC . CVPNDD . VPNKView AnswerAnswer: C

December 13, 2023 No Comments READ MORE +

When viewing data for CPMI objects in the Postgres database, what table column should be selected to query for the object instance?

When viewing data for CPMI objects in the Postgres database, what table column should be selected to query for the object instance?A . CpmiHostCkpB . fwsetC . CPM Global MD . GuiDBeditView AnswerAnswer: B

December 13, 2023 No Comments READ MORE +

SmartEvent utilizes the Log Server, Correlation Unit and SmartEvent Server to aggregate logs and identify security events.

SmartEvent utilizes the Log Server, Correlation Unit and SmartEvent Server to aggregate logs and identify security events. The three main processes that govern these SmartEvent components are:A . cpcu, cplog, cpseB . eventiasv, eventiarp,eventiacuC . cpsemd, cpsead, and DBSyncD . fwd, secu, sesrvView AnswerAnswer: C

December 13, 2023 No Comments READ MORE +

Which Check Point command can help you to display status and statistics information for various Check Point products and applications?

Check Point provides tools & commands to help you to identify issues about products and applications. Which Check Point command can help you to display status and statistics information for various Check Point products and applications?A . CPviewB . cpstatC . fwstatD . CPstatView AnswerAnswer: B

December 12, 2023 No Comments READ MORE +

URL Filtering is an essential part of Web Security in the Gateway.

URL Filtering is an essential part of Web Security in the Gateway. For the Security Gateway to perform a URL lookup when a client makes a URL request, where is the sync-request forwarded from if a sync-request is required''A . RAD Kernel SpaceB . URLF Kernel ClientC . URLF Online...

November 24, 2023 No Comments READ MORE +

What command is used to find out which port Multi-Portal has assigned to the Mobile Access Portal?

What command is used to find out which port Multi-Portal has assigned to the Mobile Access Portal?A . mpclient getdata sslvpnB . netstat -nap | grep mobileC . mpclient getdata mobiD . netstat getdata sslvpnView AnswerAnswer: A

November 23, 2023 No Comments READ MORE +

Which of the following information is available in the core dump and may be used to identify the root cause of the crash?

When a User Mode process suddenly crashes it may create a core dump file. Which of the following information is available in the core dump and may be used to identify the root cause of the crash? i Program Counter ii Stack Pointer ii. Memory management information iv Other Processor...

November 23, 2023 No Comments READ MORE +

Which of the following daemons is used for Threat Extraction?

Which of the following daemons is used for Threat Extraction?A . scrubdB . extractdC . texD . tedexView AnswerAnswer: A

November 23, 2023 No Comments READ MORE +

For TCP connections, when a packet arrives at the Firewall Kemel out of sequence or fragmented, which layer of IPS corrects this lo allow for proper inspection?

For TCP connections, when a packet arrives at the Firewall Kemel out of sequence or fragmented, which layer of IPS corrects this lo allow for proper inspection?A . Passive Streaming LibraryB . ProtectionsC . Protocol ParsersD . Context ManagementView AnswerAnswer: A

November 22, 2023 No Comments READ MORE +