List of questions
Related questions
Question 53 - 156-586 discussion
The two procedures available for debugging in the firewall kernel are
i. fw ctl zdebug
ii. fw ctl debug/kdebug
Choose the correct statement explaining the differences in the two
A.
(i) is used to debug only issues related to dropping of traffic, however (ii) can be used for any firewall issue including NATing, clustering etc.
B.
(i) is used to debug the access control policy only, however (ii) can be used to debug a unified policy
C.
(i) is used on a Security Gateway, whereas (ii) is used on a Security Management Server
D.
(i) is used for general debugging, has a small buffer and is a quick way to set kernel debug flags to getan output via command line whereas (ii) is useful when there is a need for detailed debugging and requires additional steps to set the buffer and get an output via command line
Your answer:
0 comments
Sorted by
Leave a comment first