Which of the following daemons is used for Threat Extraction?
Answer : A
What is the correct syntax to set all debug flags for Unified Policy related issues?
Answer : A
Some users from your organization have been reported some connection problems with CIFS since this morning. You suspect an IPS Issue after an automatic IPS update last night. So you want to perform a packet capture on uppercase I only directly after the IPS module (position 4 in the chain) to check if the packets pass the IPS. What command do you need to run?
Answer : A
For TCP connections, when a packet arrives at the Firewall Kernel out of sequence or fragmented, which layer of IPS corrects this to allow for proper inspection?
Answer : A
What acceleration mode utilizes multi-core processing to assist with traffic processing?
Answer : C
How many tiers of pattern matching can a packet pass through during IPS inspection?
Answer : A
James is using the same filter expression in fw monitor for CITRIX very often and instead of typing this all the time he wants to add it as a macro to the fw monitor definition file. What’s the name and location of this file?
Answer : A
What command is used to find out which port Multi-Portal has assigned to the Mobile Access Portal?
Answer : A
What file contains the RAD proxy settings?
Answer : A
Your users have some issues connecting Mobile Access VPN to the gateway. How can you debug the tunnel establishment?
Answer : A
Which Threat Prevention Daemon is the core Threat Emulation engine and responsible for emulation files and communications with Threat Cloud?
Answer : C
John has renewed his NGTX License but he gets an error (contract for Anti-Bot expired). He wants to check the subscription status on the CLI of the gateway, what command can he use for this?
Answer : A
When a User Mode process suddenly crashes, it may create a core dump file. Which of the following information is available in the core dump and may be used to identify the root cause of the crash? i. Program Counter ii. Stack Pointer iii. Memory management information iv. Other Processor and OS flags / information
Answer : C
What file extension should be used with fw monitor to allow the output file to be imported and read in WireShark?
Answer : A
Which situation triggers an IPS bypass under load on a 24-core Check Point appliance?
Answer : A