Which Security Blade needs to be enabled in order to sanitize and remove potentially malicious content from files, before those files enter the network?
Fill in the blank: The_____is used to obtain identification and security information about network users.
In the Check Point three-tiered architecture, which of the following is NOT a function of the Security Management Server?
You want to set up a VPN tunnel to a external gateway. You had to make sure that the IKE P2 SA will only be established between two subnets and not all subnets defined in the default VPN domain of your gateway.
What is required for a certificate-based VPN tunnel between two gateways with separate management systems?