Multiple Choice
Fill in the blank: To build an effective Security Policy, use a ________ and _______ rule.
A) Cleanup; stealth
B) Stealth; implicit
C) Cleanup; default
D) Implicit; explicit
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q522: Which of the following is NOT a
Q523: Why would an administrator see the message
Q524: When doing a Stand-Alone Installation, you would
Q525: AdminA and AdminB are both logged in
Q526: Which SmartConsole tab is used to monitor
Q528: R80 is supported by which of the
Q529: Assuming you have a Distributed Deployment, what
Q530: What are the two types of address
Q531: An LDAP server holds one or more
Q532: According to Check Point Best Practice, when