Check Point’s NG with Application Intelligence protects against Network and Transport layer
attacks by: (Choose two)
A.
Preventing protocol-anomaly detectionB. Allowing IP fragmentationC. Preventing validation of compliance to standards.
D.
Preventing non-TCP denial-of-service attacks, and port scanning.
E.
Preventing malicious manipulation of Network Layer protocols.