You are conducting a security audit. While reviewing configuration files and logs, you notice logs accepting POP3 traffic, but you do not see a rule allowing POP3 traffic in the Rule Base. Which of the following is the most likely cause?
A) The POP3 rule is disabled.
B) POP3 is accepted in Global Properties . POP3 is accepted in Global Properties .
C) The POP3 rule is hidden.
D) POP3 is one of 3 services (POP3, IMAP, and SMTP) accepted by the default mail object in R77.
Correct Answer:
Verified
Q90: Fill in the blank: The IPS policy
Q91: Sally has a Hot Fix Accumulator (HFA)
Q92: Which of the following is NOT an
Q93: To install a brand new Check Point
Q94: MyCorp has the following NAT rules. You
Q96: AdminA and AdminB are both logged in
Q97: What is the potential downside or drawback
Q98: Which directory holds the SmartLog index files
Q99: Message digests use which of the following?
A)
Q100: The Captive Portal tool:
A) Acquires identities from
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents