What are the three main components of Check Point security management architecture?
To view the policy installation history for each gateway, which tool would an administrator use?
Which product correlates logs and detects security threats, providing a centralized display of potential attack patterns from all network devices?
Which option, when applied to a rule, allows traffic to VPN gateways in specific VPN communities?
What are the Threat Prevention software components available on the Check Point Security Gateway?
Which is NOT an encryption algorithm that can be used in an IPSEC Security Association (Phase 2)?
Fill in the blanks: The Application Layer Firewalls inspect traffic through the ______ layer(s) of the TCP/IP model and up to and including the ______ layer.