What is true about the IPS-Blade?

What is true about the IPS-Blade?
A . in R80, IPS is managed by the Threat Prevention Policy
B . in R80, in the IPS Layer, the only three possible actions are Basic, Optimized and Strict
C . in R80, IPS Exceptions cannot be attached to “all rules”
D . in R80, the GeoPolicy Exceptions and the Threat Prevention Exceptions are the same

Answer: A

Explanation:

In R80, IPS is managed by the Threat Prevention Policy567. The Threat Prevention Policy defines how to protect the network from malicious traffic using IPS, Anti-Bot, Anti-Virus, and Threat Emulation software blades5. The IPS layer in the Threat Prevention Policy allows configuring IPS protections and actions for different network segments5. The other options are not true about the IPS-Blade.

Reference: Check Point IPS Datasheet, Check Point IPS Software Blade, Quantum Intrusion Prevention System (IPS)

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments