Which two of these Check Point Protocols are used by ?
Correct Answer:
B
Fill in the blanks: There are ______ types of software containers ______.
Correct Answer:
A
There are three types of Software Containers: Security Management, Security Gateway, and Endpoint Security.
A stateful inspection firewall works by registering connection data and compiling this information. Where is the information stored?
Correct Answer:
B
The information stored in the state tables provides cumulative data that can be used to evaluate future connections......
https://www.checkpoint.com/cyber-hub/network-security/what-is-firewall/what-is-a-stateful-firewall/
Which of the following is considered to be the more secure and preferred VPN authentication method?
Correct Answer:
B
References:
What two ordered layers make up the Access Control Policy Layer?
Correct Answer:
D