PdfPrep.com

How is communication between different Check Point components secured in R80?As with all questions, select the BEST answer.

How is communication between different Check Point components secured in R80?As with all questions, select the BEST answer.
A . By using IPSEC
B . By using SIC
C . By using ICA
D . By using 3DES

Answer: B

Explanation:

Reference: https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm?topic=documents/R80/CP_R80_SecMGMT/125443

Exit mobile version