John is a Security Administrator of a Check Point platform. He has a mis-configuration issue that
points to the Rule Base. To obtain information about the issue, John runs the command:
A.
fw debug fw on and checks the file fwm.elg.
B.
fw kdebug fwm on and checks the file fwm.elg.
C.
fw debug fwm on and checks the file fwm.elg.
D.
fw kdebug fwm on and checks the file fw.elg.
fw debug fwm – view fem.elg to find issues as SIC, Misconfigured rules, GUI Client problems and improper information.