John is a Security Administrator of a Check Point platform. He has a mis-configuration issue
that points to the Rule Base. To obtain information about the issue, John runs the
command:
A.
fw debug fw on and checks the file fwm.elg.
B.
fw kdebug fwm on and checks the file fwm.elg.
C.
fw debug fwm on and checks the file fwm.elg.
D.
fw kdebug fwm on and checks the file fw.elg.
It is C