Which one of the following is true about Threat Emulation?
Correct Answer:
D
Packet acceleration (SecureXL) identifies connections by several attributes- Which of the attributes is NOT used for identifying connection?
Correct Answer:
C
https //sc1.checkpoint.com/documents/R77/CP R77_Firewall_WebAdmm/92711.htm
Using Threat Emulation technologies, what is the best way to block .exe and .bat file types?
Correct Answer:
A