In the event that an unauthorized user attempts to compromise a valid SecureClient connection,
the SecureClient machine can remain protected by:
A.
Network Address Translation performed by the Enforcement Module.
B.
The VPN-1/FireWall-1 feature of the enterprise Enforcement Module.
C.
The organization’s internal Enforcement Module.
D.
Enforcing a Desktop Policy blocking incoming connections to the SecurClient.
E.
Implementing Perfect Forward Secrecy for all SecureClient connections.
Explanation:
p351 Check Point Mgmt II Student Manual