Which kernel process is used by Content Awareness to collect the data from contexts?
For Identity Awareness, what is the PDP process?
What is the proper command for allowing the system to create core files?
What is NOT a benefit of the ‘fw ctl zdebug’ command?
SmartEvent utilizes the Log Server, Correlation Unit and SmartEvent Server to aggregate logs and identify security events. The three main processes that govern these SmartEvent components are:
The Check Point Firewall Kernel is the core component of the Gaia operating system and an integral part of the traffic inspection process. There are two procedures available for debugging the firewall kernel. Which procedure/command is used for troubleshooting packet drops and other kernel activities while using minimal resources (1 MB buffer)?
You are using the identity Collector with identity Awareness in large environment. Users report that they cannot access resources on Internet You identify that the traffic is matching the cleanup rule
Instead of the proper rule with Access Roles using the IDC How can you check if IDC is working?
The Check Point Watch Daemon (CPWD) monitors critical Check Point processes, terminating them or restarting them as needed to maintain consistent, stable operating conditions. When checking the status/output of CPWD you are able to see some columns like APP, PID, STAT, START, etc. What is the column "STAT" used for?
In Mobile Access VPN. clientless access is done using a web browser. The primary communication path for these browser based connections is a process that allows numerous processes to utilize port
443 and redirects traffic to a designated port of the respective process Which daemon handles this?
What file contains the RAD proxy settings?
What is the kernel process for Content Awareness that collects the data from the contexts received from the CMI and decides if the file is matched by a data type?
Which command is used to write a kernel debug to a file?
Which of the following would NOT be a flag when debugging a unified policy?
Which of the following commands can be used to see the list of processes monitored by the Watch Dog process?
When debugging is enabled on firewall kernel module using the fw ctl debug' command with required options, many debug messages are provided by the kernel that help the administrator to identify
Issues. Which of the following is true about these debug messages generated by the kernel module?
When a User Mode process suddenly crashes, it may create a core dump file. Which of the following information is available in the core dump and may be used to identify the root cause of the crash?
i. Program Counter
ii. Stack Pointer
iii. Memory management information
iv. Other Processor and OS flags / information
URL Filtering is an essential part of Web Security in the Gateway. For the Security Gateway to perform a URL lookup when a client makes a URL request, where is the sync-request forwarded from if a sync-request is required?
What is the buffer size set by the fw ctl zdebug command?
What are the three main component of Identity Awareness?
How does Identity Collector connect to Windows Server?
What component is NOT part of Unified policy manager?
What is the Security Gateway directory where an administrator can find vpn debug log files generated during Site-to-Site VPN troubleshooting?
When a User process or program suddenly crashes, a core dump is often used to examine the problem Which command is used to enable the core-dumping via GAIA clish?
VPNs allow traffic to pass through the Internet securely by encrypting the traffic as it enters the VPN tunnel and decrypting the traffic as it exits. Which process is responsible for Mobile VPN connections?
What information does the doctor-log script supply?
What process monitors terminates, and restarts critical Check Point processes as necessary?
You were asked by security team to debug Mobile Access VPN. What processes will you debug?
The management configuration stored in the Postgres database is partitioned into several relational database domains. What is the purpose of the Global Domain?
PostgreSQL is a powerful, open source relational database management system. Check Point offers a command for viewing the database to interact with Postgres interactive shell. Which command do you need to enter the PostgreSQL interactive shell?
User defined URLS and HTTPS inspection User defined URLs on the Security Gateway are stored in which database file?
You are seeing output from the previous kernel debug. What command should you use to avoid that?
What is the correct syntax to turn a VPN debug on and create new empty debug files'?