List of questions
Related questions
Question 40 - 156-560 discussion
What are two basic rules Check Point recommends for building an effective policy?
A.
Cleanup and Stealth Rule
B.
VPN and Admin Rules
C.
Implicit and Explicit Rules
D.
Access and Identity Rules
Your answer:
0 comments
Sorted by
Leave a comment first