What components make up the Context Management Infrastructure?
A
Which is the correct “fw monitor” syntax for creating a capture file for loading it into WireShark?
D
Which command(s) will turn off all vpn debug collection?
C
What is the main SecureXL database for tracking acceleration status of traffic?
B
Check Point Access Control Daemons contains several daemons for Software Blades and features.
Which Daemon is used for Application & Control Filtering?
A
Which command is used to write a kernel debug to a file?
D
What is the proper command for allowing the system to create core files?
A.
$FWDIR/scripts/core-dump-enable.sh
B.
# set core-dump enable
# save config
C.
service core-dump start
D.
>set core-dump enable
>save config
D
What table does command “fwaccel conns” pull information from?
A
Which Threat Prevention Daemon is the core Threat Emulation engine and responsible for emulation
files and communications with Threat Cloud?
C
Your users have some issues connecting Mobile Access VPN to the gateway. How can you debug the
tunnel establishment?
A
What file contains the RAD proxy settings?
A
James is using the same filter expression in fw monitor for CITRIX very often and instead of typing
this all the time he wants to add it as a macro to the fw monitor definition file. Whats the name and
location of this file?
A
How many tiers of pattern matching can a packet pass through during IPS inspection?
A
What acceleration mode utilizes multi-core processing to assist with traffic processing?
C
For TCP connections, when a packet arrives at the Firewall Kernel out of sequence or fragmented,
which layer of IPS corrects this to allow for proper inspection?
A