Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Exam 156-587 All Questions
Exam 156-587 All Questions

View all questions & answers for the 156-587 exam

Checkpoint CCTE 156-587 Question # 11 Topic 2 Discussion

156-587 Exam Topic 2 Question 11 Discussion:
Question #: 11
Topic #: 2

The two procedures available for debugging in the firewall kernel are

i. fw ctl zdebug

ii. fw ctl debug/kdebug

Choose the correct statement explaining the differences in the two


A.

(i) is used to debug only issues related to dropping of traffic, however (ii) can be used for any firewall issue including NATing, clustering etc.


B.

(i) is used to debug the access control policy only, however (ii) can be used to debug a unified policy


C.

(i) is used on a Security Gateway, whereas (ii) is used on a Security Management Server


D.

(i) is used for general debugging, has a small buffer and is a quick way to set kernel debug flags to getan output via command line whereas (ii) is useful when there is a need for detailed debugging and requires additional steps to set the buffer and get an output via command line


Get Premium 156-587 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.