The R80 utility fw monitoris used to troubleshoot _____________
A . User data base corruption
B . LDAP conflicts
C . Traffic issues
D . Phase two key negotiation
Answer: C
Explanation:
Check Point’s FW Monitor is a powerful built-in tool for capturing network traffic at the packet level. The FW Monitor utility captures network packets at multiple capture points along the FireWall inspection chains. These captured packets can be inspected later using the WireShark
Reference: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk30583