ExamGecko
Question list
Search
Search

Question 53 - 156-586 discussion

Report
Export

The two procedures available for debugging in the firewall kernel are

i. fw ctl zdebug

ii. fw ctl debug/kdebug

Choose the correct statement explaining the differences in the two

A.
(i) is used to debug only issues related to dropping of traffic, however (ii) can be used for any firewall issue including NATing, clustering etc.
Answers
A.
(i) is used to debug only issues related to dropping of traffic, however (ii) can be used for any firewall issue including NATing, clustering etc.
B.
(i) is used to debug the access control policy only, however (ii) can be used to debug a unified policy
Answers
B.
(i) is used to debug the access control policy only, however (ii) can be used to debug a unified policy
C.
(i) is used on a Security Gateway, whereas (ii) is used on a Security Management Server
Answers
C.
(i) is used on a Security Gateway, whereas (ii) is used on a Security Management Server
D.
(i) is used for general debugging, has a small buffer and is a quick way to set kernel debug flags to getan output via command line whereas (ii) is useful when there is a need for detailed debugging and requires additional steps to set the buffer and get an output via command line
Answers
D.
(i) is used for general debugging, has a small buffer and is a quick way to set kernel debug flags to getan output via command line whereas (ii) is useful when there is a need for detailed debugging and requires additional steps to set the buffer and get an output via command line
Suggested answer: D
asked 16/09/2024
Yosra Chabchoub
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first