You have discovered suspicious activity in your network. What is the BEST immediate action to take?
A) Create a policy rule to block the traffic.
B) Create a suspicious action rule to block that traffic.
C) Wait until traffic has been identified before making any changes.
D) Contact ISP to block the traffic.
Correct Answer:
Verified
Q202: Which of the following commands is used
Q203: When configuring LDAP User Directory integration, Changes
Q204: When connected to the Check Point R80
Q205: Consider the Global Properties following settings:
Q206: You can see the following graphic:
Q208: Which is NOT an encryption algorithm that
Q209: Which one of the following is TRUE?
A)
Q210: Check Point ClusterXL Active/Active deployment is used
Q211: Fill in the blank: To create policy
Q212: Which Check Point software blade monitors Check
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents