|Check Point Certified Security Administrator R81
Which Security Blade needs to be enabled in order to sanitize and remove potentially malicious content from files, before those files enter the network?
Full synchronization between cluster members is handled by Firewall Kernel. Which port is used for this?
What are the three deployment options available for a security gateway?
Choose what BEST describes the reason why querying logs now are very fast.