Question 16

The two procedures available for debugging in the firewall kernel are
i fw ctl zdebug
ii fw ctl debug/kdebug
Choose the correct statement explaining the differences in the two
  • Question 17

    Which command can be run in Expert mode to verify the core dump settings?
  • Question 18

    Which Threat Prevention Daemon is the core Threat Emulation engine and responsible for emulation files and communications with Threat Cloud?
  • Question 19

    What process monitors, terminates, and restarts critical Check Point processes as necessary?
  • Question 20

    When a User Mode process suddenly crashes it may create a core dump file. Which of the following information is available in the core dump and may be used to identify the root cause of the crash?
    i Program Counter
    ii Stack Pointer
    ii. Memory management information
    iv Other Processor and OS flags / information