CheckPoint Exam Questions

Which is the BEST configuration option to protect internal users from malicious Java code, without s

Which is the BEST configuration option to protect internal users from malicious Java code, without
stripping Java scripts?

A.
Use the URI resource to strip ActiveX tags

B.
Use the URI resource to block Java code

C.
Use CVP in the URI resource to block Java code

D.
Use the URI resource to strip applet tags

Explanation: