Which of the following does a Check Point security gateway access, analyze, and use? Choose
three.
A.
Communications information
B.
Communication-derivec state
C.
Packet sniffing
D.
Information mapping
E.
Application-derived state
Which of the following does a Check Point security gateway access, analyze, and use? Choose
three.
Which of the following does a Check Point security gateway access, analyze, and use? Choose
three.
A.
Communications information
B.
Communication-derivec state
C.
Packet sniffing
D.
Information mapping
E.
Application-derived state