Antivirus protection on a Check Point Gateway is available for all of the following protocols, EXCEPT:
Antivirus protection on a Check Point Gateway is available for all of the following protocols, EXCEPT:
Which feature or command provides the easiest path for Security Administrators to revert to earlier versions o
[tagged]
Which feature or command provides the easiest path for Security Administrators to revert to earlier versions of the same Security Policy and objects configuration?
Which IPS setting will allow the Security Gateway to prevent this error page from displaying information about
A security audit has determined that your unpatched Web application server is accessing a SQL server. Which IPS setting will allow the Security Gateway to prevent this error page from displaying information about the SQL server in your DMZ?
How can you do this?
You have two rules, ten users, and two user groups in a Security Policy. You create database version 1 for this configuration. You then delete two existing users and add a new user group. You modify one rule and add two new rules to the Rule Base. You save the Security Policy and create database version 2. After awhile, you decide to roll back to version 1 to use the Rule Base, but you want to keep your user database. How can you do this?
What rules send log information to Dshield.org when Storm Center is configured?
What rules send log information to Dshield.org when Storm Center is configured?
Which command allows verification of the Security Policy name and install date on a Security Gateway?
Which command allows verification of the Security Policy name and install date on a Security Gateway?
Which type of resource could a Security Administrator use to control access to specific file shares on target
Which type of resource could a Security Administrator use to control access to specific file shares on target machines?
The fw stat -l command includes all of the following except:
The fw stat -l command includes all of the following except:
The URL Filtering Policy can be configured to monitor URLs in order to:
The URL Filtering Policy can be configured to monitor URLs in order to:
Which of the following would work BEST for your purpose?
[tagged]
Your shipping company uses a custom application to update the shipping distribution database. The custom application includes a service used only to notify remote sites that the distribution database is malfunctioning. The perimeter Security Gateway’s Rule Base includes a rule to accept this traffic. Since you are responsible for multiple sites, you want notification by a text message to your cellular phone, whenever traffic is accepted on this rule. Which of the following would work BEST for your purpose?