Exam 156-585 All QuestionsBrowse all questions from this exam
Question 22

The Check Point Firewall Kernel is the core component of the Gala operating system and an integral part of traffic inspection process. There are two procedures available for debugging the firewall kernel. Which procedure/command is used for detailed troubleshooting and needs more resources?

    Correct Answer: A

    The correct procedure/command for detailed troubleshooting of the Check Point Firewall Kernel is 'fw ctl debug/kdebug'. This command provides more detailed and flexible debugging capabilities, requiring additional resources. It is used to gather extensive information on the kernel's operations, making it suitable for in-depth troubleshooting.

Discussion
yoontztOption: A

Answer : A

lacostaOption: A

Answer is A... fw ctl zdebug is only for drops and fw ctl debug/kdebug are more detailed and flexible

castieltel

I have to disagree with you. zdebug is not only for drops, but it can also be used with another flags.

SamoojOption: A

The answer is A

EdyspbrazilOption: A

A for me too

SamoojOption: A

The Answer is A

castieltelOption: A

I agree with all comments, A is the right answer.

nmrouterOption: A

Correct answer is A.