The two procedures available for debugging in the firewall kernel are: i.

The two procedures available for debugging in the firewall kernel are: i. fw ctl zdebug ii. fw ctl debug/kdebug Choose the correct statement explaining the difference in the two.
A. (i) Is used for general debugging, has a small buffer and is a quick way to set kernel debug flags to get an output via command line whereas (ii) is useful when there is a need for detailed debugging and requires additional steps to set thebuffer and get an output via command line
B. (i) is used to debug the access control policy only, however (ii) can be used to debug a unified policy
C. (i) is used to debug only issues related to dropping traffic, however (ii) can be used for any firewall issue including NATing, clustering etc.
D. (i) is used on a Security Gateway, whereas (ii) is used on a Security Management Server

Download Printable PDF. VALID exam to help you PASS.

One thought on “The two procedures available for debugging in the firewall kernel are: i.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.