What are the three main component of Identity Awareness?
A.
User, Active Directory and Access Role
B.
Identity Awareness Blade on Security Gateway, User Database on Security Management Server and Active Directory
C.
Identity Source, Identity Server (PDP) and Identity Enforcement (PEP)
D.
Client, SMS and Secure Gateway
Answer:
c
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 2
You are seeing output from the previous kernel debug. What command should you use to avoid that?
A.
fw ctl debug = 0
B.
fw ctl clean buffer = 0
C.
fw ctl zdebug disable
D.
fw ctl debug 0
Answer:
a
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 3
Which of these packet processing components stores Rule Base matching state-related information?
A.
Observers
B.
Classifiers
C.
Manager
D.
Handlers
Answer:
d
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 4
What process monitors, terminates, and restarts critical Check Point processes as necessary?
A.
CPWD
B.
CPM
C.
FWM
D.
FWD
Answer:
a
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 5
What are the four main database domains?
A.
Local, Global, User, VPN
B.
System, Global, Log, Event
C.
System, User, Global, Log
D.
System, User, Host, Network
Answer:
c
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 6
What information does the doctor-log script supply?
A.
Logging errors, Exceptions, Repair options
B.
Current and daily average logging rates, Indexing status, Size
C.
Logging rates, Logging Directories, List of troubleshooting tips
D.
Repair options, Logging Rates, Logging Directories
Answer:
b
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 7
The FileApp parser in the Content Awareness engine does not extract text from which of the following file types?
A.
Microsoft Office Excel files
B.
PDFs
C.
Microsoft Office .docx files
D.
Microsoft Office Powerpoint files
Answer:
d
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 8
The Check Point Firewall Kernel is the core component of the Gaia operating system and an integral part of the traffic inspection process. There are two procedures available for debugging the firewall kernel. Which procedure/command is used for troubleshooting packet drops and other kernel activities while using minimal resources (1 MB buffer)?
A.
fw debug ctl
B.
fw ctl debug/kdebug
C.
fw ctl zdebug
D.
fwk ctl debug
Answer:
b
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 9
The Check Point Watch Daemon (CPWD) monitors critical Check Point processes, terminating them or restarting them as needed to maintain consistent, stable operating conditions. When checking the status/output of CPWD you are able to see some columns like APP, PID, STAT, START, etc. What is the column STAT used for?
A.
Shows the Watch Dog name of the monitored process
B.
Shows the status of the monitored process
C.
Shows how many times the Watch Dog started the monitored process
D.
Shows what monitoring method Watch Dog is using totrack the process
Answer:
b
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 10
SmartEvent utilizes the Log Server, Correlation Unit and SmartEvent Server to aggregate logs and identify security events. The three main processes that govern these SmartEvent components are: