Join the discussion
Add Comments
- Other Question (64q)
- Q1. Troubleshooting issues with Mobile Access requires the following:...
- Q2. What tool would you run to diagnose logging and indexing?...
- Q3. You want to fully investigate the VPN establishment, what will you do?...
- Q4. In Check Point's Packet Processing Infrastructure, what is the role of Observers?...
- Q5. What is the correct syntax to turn a VPN debug on and create new empty debug files?...
- Q6. What command(s) will turn off all vpn debug collection?...
- Q7. Which of the following is a component of the Context Management Infrastructure used to col...
- Q8. What are the four main database domains?
- Q9. Which of the following commands can be used to see the list of processes monitored by the ...
- Q10. John has renewed his NPTX License but he gets an error (contract for Anti-Bot expired). He...
- Q11. Which Daemon should be debugged for HTTPS inspection related issues?...
- Q12. The Check Point Watch Daemon (CPWD) monitors critical Check Point processes, terminating t...
- Q13. When a User Mode process suddenly crashes, it may create a core dump file. Which of the fo...
- Q14. That is the proper command for allowing the system to create core files?...
- Q15. What are the main components of Check Point's Security Management architecture?...
- Q16. The packet processing infrastructure consists of 4 components. Which component contains th...
- Q17. What is correct about the Resource Advisor (RAD) service on the Security Gateways?...
- Q18. What Check Point process controls logging?
- Q19. What is NOT a benefit of the 'fw ctl zdebug' command?...
- Q20. The Check Point Watch Daemon (CPWD) monitors critical Check Point processes, terminating t...
- Q21. The Check Point Firewall Kernel is the core component of the Gaia operating system and an ...
- Q22. Check Point Access Control Daemons contains several daemons for Software Blades and featur...
- Q23. Which of the following commands can be used to see the list of processes monitored by the ...
- Q24. During firewall kernel debug with fw ctl zdebug you received less information that expecte...
- Q25. If the cpsemd process of SmartEvent has crashed or is having trouble coming up, then it us...
- Q26. When a user space process or program suddenly crashes, what type of file is created for an...
- Q27. Your users are having trouble opening a Web page and you need to troubleshoot it. You open...
- Q28. What command is used to find out which port Multi-Portal has assigned to the Mobile Access...
- Q29. Which process is responsible for the generation of certificates?...
- Q30. What is the most efficient way to read an IKEv2 Debug?...
- Q31. What are the four main database domains?
- Q32. Check Point Threat Prevention policies can contain multiple policy layers and each layer c...
- Q33. What is the correct syntax to set all debug flags for Unified Policy related issues?...
- Q34. What information does the doctor-log script supply?...
- Q35. How does Identity Collector connect to Windows Server?...
- Q36. What is the best way to resolve an issue caused by a frozen process?...
- Q37. How can you start debug of the Unified Policy with all possible flags turned on?...
- Q38. When a User process or program suddenly crashes, a core dump is often used to examine the ...
- Q39. Which of these packet processing components stores Rule Base matching state-related inform...
- Q40. Where will the usermode core files located?
- Q41. When a User Mode process suddenly crashes, it may create a core dump file. Which of the fo...
- Q42. Packet processing infrastructure consists of the following components EXCEPT:...
- Q43. For Identity Awareness, what is the PDP process?...
- Q44. Which command shows the installed licenses and contracts on a Check Point device?...
- Q45. If SmartLog is not active or failed to parse results from server, what commands can be run...
- Q46. When viewing data for CPMI objects in the Postgres database, what table column should be s...
- Q47. What is the function of the Core Dump Manager utility?...
- Q48. SmartEvent utilizes the Log Server, Correlation Unit and SmartEvent Server to aggregate lo...
- Q49. What Check Point process controls logging?
- Q50. What is the most efficient way to read an IKEv2 Debug?...
- Q51. SmartEvent utilizes the Log Server, Correlation Unit and SmartEvent Server to aggregate lo...
- Q52. What is the kernel process for Content Awareness that collects the data from the contexts ...
- Q53. When a User process or program suddenly crashes, a core dump is often used to examine the ...
- Q54. The two procedures available for debugging in the firewall kernel are i. fw ctl zdebug ii....
- Q55. What information does the doctor-log script supply?...
- Q56. You do not see logs in the SMS. When you login on the SMS shell and run cpwd_admin list yo...
- Q57. When a user space process or program suddenly crashes, what type of file is created for an...
- Q58. Which of the following file is commonly associated with troubleshooting crashes on a syste...
- Q59. When a User process or program suddenly crashes, a core dump is often used to examine the ...
- Q60. What is the kernel process for Content Awareness that collects the data from the contexts ...
- Q61. The Check Point Firewall Kernel is the core component of the Gaia operating system and an ...
- Q62. What are the main components of Check Point's Security Management architecture?...
- Q63. How many packets are needed to establish IKEv1?...
- Q64. What is the buffer size set by the fw ctl zdebug command?...
