Question 106

Checkpoint Firewall logs can be viewed through a Check Point Log viewer that uses icons and colors in the log table to represent different security events and their severity. What does the icon in the checkpoint logs represent?
  • Question 107

    What stage of the incident handling process involves reporting events?
  • Question 108

    You are running known exploits against your network to test for possible vulnerabilities. To test the strength of your virus software, you load a test network to mimic your production network. Your software successfully blocks some simple macro and encrypted viruses. You decide to really test the software by using virus code where the code rewrites itself entirely and the signatures change from child to child, but the functionality stays the same. What type of virus is this that you are testing?
  • Question 109

    Which of the following does Microsoft Exchange E-mail Server use for collaboration of various e-mail applications?
  • Question 110

    Which of the following commands shows you the username and IP address used to access the system via a remote login session and the type of client from which they are accessing the system?