Question 96
Fill in the blank: The "fw monitor" tool can be best used to troubleshoot ____________________.
Question 97
In what way is Secure Distribute (SND) a relevant feature if the security gateway?
Question 98
Can Check Point and Third-party Gateways establish a certificate-based Site-to-Site VPN tunnel?
Question 99
You select the file type that are sent for emulation for all the Threat prevention profiles. Each profile defines a (n) _____ or ________ action for the file types.
Question 100
In R80.10, how do you manage your Mobile Access Policy?