What is the name of the FW1 facility that can protect against SYN flood attacks?
What is the name of the FW1 facility that can protect against SYN flood attacks?
What is the name given to the ability of a CVP manager to sequentially use the services of several CVP servers
What is the name given to the ability of a CVP manager to sequentially use the services of several
CVP servers as part of a single request from a firewall?
Which VPN type is used by SecuRemote?
Which VPN type is used by SecuRemote?
What is the name given to a server, which maintains a list of banned URL’s?
What is the name given to a server, which maintains a list of banned URL’s?
Which of the following is an encryption method that uses a different keys to decrypt and encrypt messages?
Which of the following is an encryption method that uses a different keys to decrypt and encrypt
messages?
What name is given to the option of specifying that keys should be exchanged at intervals during phase 2 of th
What name is given to the option of specifying that keys should be exchanged at intervals during
phase 2 of the IKE (ISAKMP) process?
Which of the following is a Checkpoint proprietary encryption algorithm?
Which of the following is a Checkpoint proprietary encryption algorithm?
What is NOT true if you add a SecuRemote site and its encryption domain overlaps an already configured site?
What is NOT true if you add a SecuRemote site and its encryption domain overlaps an already
configured site?
True of false?
MD5 is the only data integrity method applicable to the FWZ scheme.
True of false?
What is the name given to a server giving anti virus protection for transferred files?
What is the name given to a server giving anti virus protection for transferred files?