Question 121

If the Active Security Management Server fails or if it becomes necessary to change the Active to Standby, the following steps must be taken to prevent data loss. Providing the Active Security Management Server is responsible, which of these steps should NOT be performed:
  • Question 122

    Which Check Point software blade provides Application Security and identity control?
  • Question 123

    Which information is included in the "Extended Log" tracking option, but is not included in the "Log" tracking option?
  • Question 124

    In what way are SSL VPN and IPSec VPN different?
  • Question 125

    Which of the following describes how Threat Extraction functions?