Question 121
Which application is used for the central management and deployment of licenses and packages?
Question 122
What are the Threat Prevention software components available on the Check Point Security Gateway?
Question 123
When Identity Awareness is enabled, which identity source(s) is(are) used for Application Control?
Question 124
What is the potential downside or drawback to choosing the Standalone deployment option instead of the Distributed deployment option?
Question 125
How do logs change when the "Accounting" tracking option is enabled on a traffic rule?
