Question 6

You are the administrator for Alpha Corp. You have logged into your R80 Management server. You are making some changes in the Rule Base and notice that rule No.6 has a pencil icon next to it.

What does this mean?
  • Question 7

    Which Threat Prevention Software Blade provides protection from malicious software that can infect your network computers?
  • Question 8

    What will be the effect of running the following command on the Security Management Server?
  • Question 9

    What is the purpose of the Stealth Rule?
  • Question 10

    Fill in the blank: When LDAP is integrated with Check Point Security Management, it is then referred to as
    _______