Question 106
Checkpoint Firewall logs can be viewed through a Check Point Log viewer that uses icons and colors in the log table to represent different security events and their severity. What does the icon in the checkpoint logs represent?
Question 107
What stage of the incident handling process involves reporting events?
Question 108
You are running known exploits against your network to test for possible vulnerabilities. To test the strength of your virus software, you load a test network to mimic your production network. Your software successfully blocks some simple macro and encrypted viruses. You decide to really test the software by using virus code where the code rewrites itself entirely and the signatures change from child to child, but the functionality stays the same. What type of virus is this that you are testing?
Question 109
Which of the following does Microsoft Exchange E-mail Server use for collaboration of various e-mail applications?
Question 110
Which of the following commands shows you the username and IP address used to access the system via a remote login session and the type of client from which they are accessing the system?
