Which command should John run to view the CPU role allocation?

John works for ABC Corporation. They have enabled CoreXL on their firewall John would like to identify the cores on which the SND runs and the cores on which the firewall instance is running. Which command should John run to view the CPU role allocation?A . fw ctl affinity -vB...

October 30, 2021 No Comments READ MORE +

After kernel debug with "fw ctl debug" you received a huge amount of information It was saved in a very large file that is difficult to open and analyze with standard text editors Suggest a solution to solve this issue.

After kernel debug with "fw ctl debug" you received a huge amount of information It was saved in a very large file that is difficult to open and analyze with standard text editors Suggest a solution to solve this issue.A . Use "fw ctl zdebug' because of 1024KB buffer sizeB...

October 30, 2021 4 Comments READ MORE +

Which process is responsible for the generation of certificates?

Which process is responsible for the generation of certificates?A . cpmB . cpcaC . dbsyncD . fwmView AnswerAnswer: B

October 29, 2021 No Comments READ MORE +

Which of the following is NOT a valid "fwaccel" parameter?

Which of the following is NOT a valid "fwaccel" parameter?A . statB . statsC . templatesD . packetsView AnswerAnswer: D Explanation: Reference: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk41397

October 29, 2021 No Comments READ MORE +

What should you do to resolve this issue?

During firewall kernel debug with fw ctl zdebug you received less information than expected. You noticed that a lot of messages were lost since the time the debug was started. What should you do to resolve this issue?A . Increase debug buffer; Use fw ctl debug Cbuf 32768B . Redirect...

October 29, 2021 2 Comments READ MORE +

Which Threat Prevention daemon is the core Threat Emulator, engine and responsible for emulation files and communications with Threat Cloud?

Which Threat Prevention daemon is the core Threat Emulator, engine and responsible for emulation files and communications with Threat Cloud?A . ctasdB . inmsdC . tedD . scrubView AnswerAnswer: C Explanation: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk97638

October 28, 2021 No Comments READ MORE +

What is the reason for failed VPN connection?

Vanessa is reviewing ike.elg file to troubleshoot failed site-to-site VPN connection After sending Mam Mode Packet 5 the response from the peer is PAYLOAD-MALFORMED" What is the reason for failed VPN connection?A . The authentication on Phase 1 is causing the problem. Pre-shared key on local gateway encrypted by the...

October 28, 2021 No Comments READ MORE +

What command sets a specific interface as not accelerated?

What command sets a specific interface as not accelerated?A . noaccel-s<interface1>B . fwaccel exempt state <interface1>C . nonaccel -s <interface1>D . fwaccel -n <intetface1 >View AnswerAnswer: C

October 27, 2021 2 Comments READ MORE +

Which Daemon is used for Application & Control URL Filtering?

Check Point Access Control Daemons contains several daemons for Software Blades and features. Which Daemon is used for Application & Control URL Filtering?A . radB . cpradC . pepdD . pdpdView AnswerAnswer: A

October 27, 2021 No Comments READ MORE +

Which command can be run in Expert mode lo verify the core dump settings?

Which command can be run in Expert mode lo verify the core dump settings?A . grep cdm /config/db/coredumpB . grep cdm /config/db/initialC . grep SFWDlR/config/db/initialD . cat /etc/sysconfig/coredump/cdm confView AnswerAnswer: B

October 27, 2021 No Comments READ MORE +