Which kernel debug flag should you use to troubleshoot NAT connections?

Which kernel debug flag should you use to troubleshoot NAT connections?A . fw ctl debug + xlate xltrc nat tableB . fw ctl debug + xltrc xlate nat connC . fw ctl debug + xlate xltrc nat conn dropD . fw ctl debug + fwx_alloc nat conn dropView AnswerAnswer: C

November 18, 2018 No Comments READ MORE +

How often will a gateway with Performance Pack running by default automatically review and distribute interface affinity between cores?

How often will a gateway with Performance Pack running by default automatically review and distribute interface affinity between cores?A . Every 60 secondsB . Interface affinity is determined at gateway build time and does not changeC . Every 5 minutesD . Every 10 secondsView AnswerAnswer: A Explanation: Reference: https://sc1.checkpoint.com/documents/R76/ CP_R76_PerformanceTuning_WebAdmin/6731.htm

November 15, 2018 No Comments READ MORE +

What mechanism can be used to confirm that important traffic such as control connections are not dropped?

Consider a Check Point Security Gateway under high load. What mechanism can be used to confirm that important traffic such as control connections are not dropped?A . fw debug fgd50 on OPSEC_DEBUG_LEVEL=3B . fw ctl multik prioqC . fgate Cd loadD . fw ctl debug Cm fg allView AnswerAnswer: A

November 13, 2018 No Comments READ MORE +

How can he solve the problem?

Joey’s implementing a new R80.10 firewall cluster into the network. During the implementation he notices that the cluster object is in error state in SmartConsole. He tries to figure out the cause of the problem and runs a ClusterXL kernel debug with command: ‘fw ctl debug Cm cluster + stat...

November 12, 2018 No Comments READ MORE +

Which of the following is not one of the relational database domains that stores the management configuration?

Which of the following is not one of the relational database domains that stores the management configuration?A . User DomainB . System DomainC . Global DomainD . Audit DomainView AnswerAnswer: D

November 5, 2018 No Comments READ MORE +

Fill in the blank. The tool ____________________ generates a R80 Security Gateway configuration report.

Fill in the blank. The tool ____________________ generates a R80 Security Gateway configuration report.A . infoCPB . infoviewC . cpinfoD . fw cpinfoView AnswerAnswer: C

October 29, 2018 No Comments READ MORE +

What must be done for the “fw monitor” command to capture packets through the firewall kernel?

What must be done for the “fw monitor” command to capture packets through the firewall kernel?A . SecureXL must be disabledB . ClusterXL must be temporarily disabledC . Firewall policy must be re-installedD . The output file must be transferred to a machine with WireSharkView AnswerAnswer: A Explanation: Reference: https://supportcenter.checkpoint.com/supportcenter/portal?...

October 29, 2018 No Comments READ MORE +

Which command would you use to check CoreXL instances for IPv6 traffic?

Which command would you use to check CoreXL instances for IPv6 traffic?A . fwaccel6 statsB . fwaccel6 statC . fw ctl multik statD . fw6ctl multik statView AnswerAnswer: C

October 26, 2018 1 Comment READ MORE +

What is the correct command to turn off an IKE debug?

What is the correct command to turn off an IKE debug?A . vpn debug ikeoffB . fw ctl debug ikeoffC . vpn debug ikeoff 0D . fw ctl vpn debug ikeoffView AnswerAnswer: A Explanation: Reference: https://community.checkpoint.com/docs/DOC-3023-vpn-troubleshooting-commands

October 14, 2018 No Comments READ MORE +

Which command is used to enable IPv6 on Security Gateway?

Which command is used to enable IPv6 on Security Gateway?A . set ipv6-state onB . add ipv6 interface onC . set ipv6-enable onD . set ipv6-state enabledView AnswerAnswer: A

October 11, 2018 No Comments READ MORE +