Question 76
IF the first packet of an UDP session is rejected by a rule definition from within a security policy (not including the clean up rule), what message is sent back through the kernel?
Question 77
In which scenario will an administrator need to manually define Proxy ARP?
Question 78
Which Check Point feature enables application scanning and the detection?
Question 79
Which SmartConsole tab is used to monitor network and security performance?
Question 80
What are the Threat Prevention software components available on the Check Point Security Gateway?
