In the event that an unauthorized user attempts to compromise a valid SecureClient connection, the SecureClient machine can remain protected by:

In the event that an unauthorized user attempts to compromise a valid SecureClient connection,
the SecureClient machine can remain protected by:

In the event that an unauthorized user attempts to compromise a valid SecureClient connection,
the SecureClient machine can remain protected by:

A.
Network Address Translation performed by the Enforcement Module.

B.
The VPN-1/FireWall-1 feature of the enterprise Enforcement Module.

C.
The organization’s internal Enforcement Module.

D.
Enforcing a Desktop Policy blocking incoming connections to the SecurClient.

E.
Implementing Perfect Forward Secrecy for all SecureClient connections.

Explanation:

p351 Check Point Mgmt II Student Manual



Leave a Reply 0

Your email address will not be published. Required fields are marked *