|Check Point Certified Security Administrator R81
When a Security Gateway sends its logs to an IP address other than its own, which deployment option is installed?
What is the user ID of a user that have all the privileges of a root user?
Which of the following is used to extract state related information from packets and store that information in state tables?
You have discovered suspicious activity in your network. What is the BEST immediate action to take?