Question 121
If the Active Security Management Server fails or if it becomes necessary to change the Active to Standby, the following steps must be taken to prevent data loss. Providing the Active Security Management Server is responsible, which of these steps should NOT be performed:
Question 122
Which Check Point software blade provides Application Security and identity control?
Question 123
Which information is included in the "Extended Log" tracking option, but is not included in the "Log" tracking option?
Question 124
In what way are SSL VPN and IPSec VPN different?
Question 125
Which of the following describes how Threat Extraction functions?
