Question 136

What are valid Policy Types in R81.X?
  • Question 137

    Using fw monitor you see the following inspection point notion E and i what does that mean?
  • Question 138

    Vanessa is expecting a very important Security Report. The Document should be sent as an attachment via e-mail. An e-mail with Security_report.pdf file was delivered to her e-mail inbox. When she opened the PDF file, she noticed that the file is basically empty and only few lines of text are in it. The report is missing some graphs, tables and links.
    Which component of SandBlast protection is her company using on a Gateway?
  • Question 139

    Check Point recommends configuring Disk Space Management parameters to delete old log entries when available disk space is less than or equal to?
  • Question 140

    The "Hit count" feature allows tracking the number of connections that each rule matches. Will the Hit count feature work independently from logging and Track the hits if the Track option is set to "None"?