Q: 1
What are two types of SAs in the VPN negotiation?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 2
Which of the following System Monitoring Commands (Linux) shows process resource utilization, as
well as CPU and memory utilization?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 3
Running tcpdump causes a significant increase on CPU usage, what other option should you use?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 4
Running tcpdump causes a significant increase in CPU usage, what other option should you use?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 5
Which of the following is NOT a way to insert fw monitor into the chain when troubleshooting
packets throughout the chain?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 6
You want to print the status of WatchDog-monitored processes. What command best meets your
needs?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 7
What are the commands to verify the Smart Contracts on the Security Gateway?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 8
The communication between the Security Management Server and Security Gateway to forward logs
is done using the following process and port number:
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 9
For Threat Prevention, which process is enabled when the Policy Conversion process has debug
turned on using the INTERNAL_POLICY_LOADING=1 command?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 1 of 20 · Page 1 / 2