Question 16
The two procedures available for debugging in the firewall kernel are
i fw ctl zdebug
ii fw ctl debug/kdebug
Choose the correct statement explaining the differences in the two
i fw ctl zdebug
ii fw ctl debug/kdebug
Choose the correct statement explaining the differences in the two
Question 17
Which command can be run in Expert mode to verify the core dump settings?
Question 18
Which Threat Prevention Daemon is the core Threat Emulation engine and responsible for emulation files and communications with Threat Cloud?
Question 19
What process monitors, terminates, and restarts critical Check Point processes as necessary?
Question 20
When a User Mode process suddenly crashes it may create a core dump file. Which of the following information is available in the core dump and may be used to identify the root cause of the crash?
i Program Counter
ii Stack Pointer
ii. Memory management information
iv Other Processor and OS flags / information
i Program Counter
ii Stack Pointer
ii. Memory management information
iv Other Processor and OS flags / information