The management configuration stored in the Postgres database is partitioned into several relational database domains. What is the purpose of the Global Domain?
A.
Global Domains is used by the IPS software blade to map the IDs to the corresponding countries according to the IpToCountry.csv file.
B.
This domain is used as the global database to back up the objects referencing the corresponding object attributes from the System Domain.
C.
This domain is used as the global database to track the changes made by multiple administrators on the same objects prior to publishing.
D.
This domain is used as the global database for MDSM and contains global objects and policies.
Answer:
d
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 2
During firewall kernel debug with fw ctl zdebug you received less information that expected. You noticed that a lot of messages were lost since the time the debug was started. What should you do to resolve this issue?
A.
Increase debug buffer; Use fw ctl debug -buf 32768
B.
Redirect debug output to file; Use fw ctl debug -o ./debug.elg
C.
Redirect debug output to file; Use fw ctl zdebug -o ./debug.elg
D.
Increase debug buffer; Use fw ctl zdebug -buf 32768
Answer:
a
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 3
If the cpsemd process of SmartEvent has crashed or is having trouble coming up, then it usually indicates that __________.
A.
The SmartEvent core on the Solr indexer has been deleted
B.
The logged in administrator does not have permissions to run SmartEvent
C.
Postgres database is down
D.
Cpd daemon is unable to connect to the log server
Answer:
c
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 4
Which of the following file is commonly associated with troubleshooting crashes on a system such as the Security Gateway?
A.
fw monitor
B.
CPMIL dump
C.
core dump
D.
tcpdump
Answer:
c
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 5
Which of the following is a component of the Context Management Infrastructure used to collect signatures in user space from multiple sources, such as Application Control and IPS, and compiles them together into unified Pattern Matchers?
A.
PSL - Passive Signature Loader
B.
cpas
C.
Context Loader
D.
CMI Loader
Answer:
d
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 6
The Check Point Firewall Kernel is the core component of the Gaia operating system and an integral part of traffic inspection process. There are two procedures available for debugging the firewall kernel. Which procedure/command is used for detailed troubleshooting and needs more resources?
A.
fw debug/kdebug
B.
fw ctl zdebug
C.
fw debug/kdebug ctl
D.
fw ctl debug/kdebug
Answer:
d
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 7
What are the main components of Check Points Security Management architecture?
A.
Management server, Log server, Gateway server, Security server
B.
Management server, management database, log server, automation server
C.
Management server, Security Gateway, Multi-Domain Server, SmartEvent Server
D.
Management server, Log Server, LDAP Server, Web Server
Answer:
b
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 8
What cli command is run on the GW to verify communication to the Identity Collector?
A.
fwd connected
B.
pdp connections idc
C.
pep connections idc
D.
show idc connections
Answer:
b
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 9
What is the kernel process for Content Awareness that collects the data from the contexts received from the CMI and decides if the file is matched by a data type?
A.
cntawmod
B.
dlpda
C.
dlpu
D.
cntmgr
Answer:
a
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 10
You receive reports that Users cannot browse internet sites. You are using identity awareness with AD Query and Identity Collector in addition you have the Browser Based Authentication Enabled. What command can be used to debug the problem?