Multiple Choice
You find a suspicious connection from a problematic host. You decide that you want to block everything from that whole network, not just the problematic host. You want to block this for an hour while you investigate further, but you do not want to add any rules to the Rule Base. How do you achieve this?
A) Use dbedit to script the addition of a rule directly into the Rule Bases_5_0.fws configuration file. Use dbedit to script the addition of a rule directly into the Rule Bases_5_0.fws configuration file.
B) Select Block intruder from the Tools menu in SmartView Tracker. Select Block intruder from the Tools menu in SmartView Tracker.
C) Create a Suspicious Activity Rule in Smart Monitor.
D) Add a temporary rule using SmartDashboard and select hide rule . Add a temporary rule using SmartDashboard and select hide rule .
Correct Answer:

Verified
Correct Answer:
Verified
Q177: To enforce the Security Policy correctly, a
Q178: Which component functions as the Internal Certificate
Q179: Which of these components does NOT require
Q180: Which of the following is an identity
Q181: Fill in the blank: A new license
Q183: What are the three components for Check
Q184: Which of the following is NOT an
Q185: The command _ provides the most complete
Q186: In the Check Point three-tiered architecture, which
Q187: Which option would allow you to make