Which of the following System Monitoring Commands (Linux) shows process resource utilization, as well as CPU and memory utilization?
Where would you look to find the error log file to investigate a logging issue on the Security Management Server?
Check Point provides tools & commands to help you identify issues about products and applications. Which Check Point command can help you display status and statistics information for various Check Point products and applications?
What is the difference between the “Super User" and “Read Write All" SmartConsole permission profiles?
As a security administrator/engineer in your company, you have noticed that your HQ Check Point Security Management Server is not receiving logs from your HQ Check Point Gateway/Cluster. To investigate this issue in the command line, you will need to verify which process is running?
You were asked to set up logging for a rule to log a full list of URLs when the rule hits in the Rule Base. How do you accomplish that?
You need to switch the active log file on the Security Gateway. What is the correct command?
In the Security Management Architecture, what port and process SmartConsole uses to communicate with the management server?
For Threat Prevention, which process is enabled when the Policy Conversion process has debug turned on using the INTERNAL_POLICY_LOADING=1 command?
After manipulating the rulebase and objects with SmartConsole the application crashes and closes immediately. To troubleshoot, you will need to review the crash report. In which directory on the host PC will you find this report?
Where can a Check Point customer find information about product licenses they own, download product manuals, and get information about product support expiration?
Which of the following is a valid way to capture packets on Check Point gateways?
Which is the correct "fw monitor" syntax for creating a capture file for loading it into Wireshark?