Which software blade does NOT accompany the Threat Prevention policy?
Correct Answer:
D
Which one of the following is true about Threat Emulation?
Correct Answer:
D
The Correlation Unit performs all but the following actions:
Correct Answer:
C
In the Check Point Firewall Kernel Module, each Kernel is associated with a key, which specifies the type of traffic applicable to the chain module. For Stateful Mode configuration, chain modules marked with
_______ will not apply.
Correct Answer:
D
What is the Implicit Clean-up Rule?
Correct Answer:
C