CheckPoint Exam Questions

Which type of rule should be placed above the Stealth Rule?

Which type of rule should be placed above the Stealth Rule?

A.
User Authentication

B.
Client Authentication

C.
Network Address Translation

D.
Cleanup

E.
Session Authentication