John has renewed his NPTX License but he gets an error (contract for Anti-Bot expired). He wants to check the subscription status on the CLI of the gateway, what command can he use for this?
What is the simplest and most efficient way to check all dropped packets in real time?
The Check Point Firewall Kernel is the core component of the Gaia operating system and an integral part of traffic inspection process. There are two procedures available for debugging the firewall kernel. Which procedure/command is used for detailed troubleshooting and needs more resources?
Which of the following is a component of the Context Management Infrastructure used to collect signatures in user space from multiple sources such as Application Control and IPS. and compiles them together into unified Pattern Matchers?
When viewing data for CPMI objects in the Postgres database, what table column should be selected to query for the object instance?
What Check Point process controls logging?
What is the best way to resolve an issue caused by a frozen process?
Which command is used to write a kernel debug to a file?
What information does the doctor-log script supply?
When URL category is not found in the kernel cache, what action will GW do?
Where will the usermode core files located?
For identity Awareness what is the PDP process?
Where do you enable log indexing on the SMS?
You receive reports that Users cannot browse internet sites. You are using identity awareness with AD Query and Identity Collector in addition you have the Browser Based Authentication Enabled. What command can be used to debug the problem?
You receive complains that Guest Users cannot login and use the Guest Network which is configured with Access Role of Guest Users. You need to verity the Captive Portal configuration. Where can
you find the config file?
Which of the following file is commonly associated with troubleshooting crashes on a system such as the Security Gateway?
What tool would you run to diagnose logging and indexing?
In the Security Management Architecture, what port and process does SmartConsole use to communicate with the Security Management Server?
What is NOT a benefit of the ‘fw ctl zdebug’ command?
You are using the identity Collector with identity Awareness in large environment. Users report that they cannot access resources on Internet You identify that the traffic is matching the cleanup rule
Instead of the proper rule with Access Roles using the IDC How can you check if IDC is working?
What is the benefit of fw ctl debug over fw ctl zdebug?
Like a Site-to-Site VPN between two Security Gateways, a Remote Access VPN relies on the Internet Key Exchange (IKE) what types of keys are generated by IKE during negotiation?
When a user space process or program suddenly crashes, what type of file is created for analysis
Captive Portal, PDP and PEP run in what space?
SmartEvent utilizes the Log Server, Correlation Unit and SmartEvent Server to aggregate logs and identify security events. The three main processes that govern these SmartEvent components are:
What is NOT monitored as a PNOTE by ClusterXL?
What file contains the RAD proxy settings?
You do not see logs in the SMS. When you login on the SMS shell and run cpwd_admin list you notice that the RFL process is with status T. What command can you run to try to resolve it?
Which of the following would NOT be a flag when debugging a unified policy?
Which of the following daemons is used for Threat Extraction?
What is correct about the Resource Advisor (RAD) service on the Security Gateways?
For Identity Awareness, what is the PDP process?