Notifications
Clear all
Topic starter
What are two basic rules Check Point recommends for building an effective policy?
- A . Cleanup and Stealth Rule
B. VPN and Admin Rules
C. Implicit and Explicit Rules
D. Access and Identity Rules
Suggested Answer: C
Posted : 21/01/2023 8:18 am