You need to run a kernel debug over a longer period of time as the problem occurs only once or twice a week. Therefore, you need to add a timestamp to the kernel debug and write the output to a file but you can’t afford to fill up all the remaining disk space and you only have 10 GB free for saving the debugs. What is the correct syntax for this?
What is the kernel process for Content Awareness that collects the data from the contexts received from the CMI and decides if the file is matched by a data type?
Check Point Access Control Daemons contains several daemons for Software Blades and features. Which Daemon is used for Application & Control URL Filtering?
What is the simplest and most efficient way to check all dropped packets in real time?
If SmartLog is not active or failed to parse results from server, what commands can be run to re-enable the service?
What are the main components of Check Point’s Security Management architecture?
Your users have some issues connecting with Mobile Access VPN to your gateway. How can you debug the tunnel establishment?
When viewing data for CPMI objects in the Postgres database, what table column should be selected to query for the object instance?
What is the Security Gateway directory where an administrator can find vpn debug log files generated during Site-to-Site VPN troubleshooting?
You are using the Identity Collector with Identity Awareness in large environment. Users report that they cannot access resources on Internet. You identify that the traffic is matching the cleanup rule instead of the proper rule with Access Roles using the IDC. How can you check if IDC is working?
What process monitors, terminates, and restarts critical Check Point processes as necessary?
Which of the following commands can be used to see the list of processes monitored by the Watch Dog process?
When a User process or program suddenly crashes, a core dump is often used to examine the problem. Which command is used to enable the core-dumping via GAIA clish?
You receive reports that Users cannot browse internet sites. You are using identity awareness with AD Query and Identity Collector in addition you have the Browser Based Authentication Enabled. What command can be used to debug the problem?
How can you start debug of the Unified Policy with all possible flags turned on?