Prev Question
Next Question

Fill in the blank: The R80 feature ________ permits blocking specific IP addresses for a specified time period.

A.
Block Port Overflow

B.
Local Interface Spoofing

C.
Suspicious Activity Monitoring

D.
Adaptive Threat Prevention

Explanation:
Suspicious Activity Rules Solution
Suspicious Activity Rules is a utility integrated into SmartView Monitor that is used to modify access privilegesupon detection of any suspicious network activity (for example, several attempts to gain unauthorized access).
The detection of suspicious activity is based on the creation of Suspicious Activity rules. Suspicious Activity
rules are Firewall rules that enable the system administrator to instantly block suspicious connections that are
not restricted by the currently enforced security policy. These rules, once set (usually with an expiration date),
can be applied immediately without the need to perform an Install Policy operation
https://sc1.checkpoint.com/documents/R76/CP_R76_SmartViewMonitor_AdminGuide/17670.htm

Prev Question
Next Question

Leave a Reply

Your email address will not be published. Required fields are marked *