1.
Study the Rule base and Client Authentication Action properties screen - After being authenticated by the Security Gateway, when a user starts an HTTP connection to a Web site, the user tries to FTP to another site using the command line. What happens to the user? The:
2.
Review the rules. Assume domain UDP is enabled in the impled rules. What happens when a user from the internal network tries to browse to the internet using HTTP? The user:
3.
Which rule is responsible for the installation failure?
4.
Which rule is responsible for the installation failure?
5.
Where is the fingerprint generated, based on the output display?
6.
What happens if you select Web Server in the dialog box?
7.
When configuring the Check Point Gateway network interfaces, you can define the direction as Internal or External. What does the option Interface leads to DMZ mean?
8.
What happens when you open the Gateway object window Trusted Communication and press and confirm Reset?
9.
As you review this Security Policy, what changes could you make to accommodate Rule 4?
10.
You review this Security Policy because Rule 4 is inhibited. Which Rule is responsible?