00:00

QUESTION 41

Which two of these Check Point Protocols are used by ?

Correct Answer: B

QUESTION 42

Fill in the blanks: There are ______ types of software containers ______.

Correct Answer: A
There are three types of Software Containers: Security Management, Security Gateway, and Endpoint Security.

QUESTION 43

A stateful inspection firewall works by registering connection data and compiling this information. Where is the information stored?

Correct Answer: B
The information stored in the state tables provides cumulative data that can be used to evaluate future connections......
https://www.checkpoint.com/cyber-hub/network-security/what-is-firewall/what-is-a-stateful-firewall/

QUESTION 44

Which of the following is considered to be the more secure and preferred VPN authentication method?

Correct Answer: B
References:

QUESTION 45

What two ordered layers make up the Access Control Policy Layer?

Correct Answer: D