How is communication between different Check Point components secured in R80?As with all questions, select the BEST answer.

Posted by: Pdfprep Category: 156-315.80 Tags: , ,

How is communication between different Check Point components secured in R80?As with all questions, select the BEST answer.
A . By using IPSEC
B . By using SIC
C . By using ICA
D . By using 3DES

Answer: B

Explanation:

Reference: https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm?topic=documents/R80/CP_R80_SecMGMT/125443

Leave a Reply

Your email address will not be published.