Which of the following statements BEST describes Check Point’s Hide Network Checkpoints Address Translation method?
What must a Security Administrator do to comply with a management requirement to log all traffic accepted through the perimeter Security gateway?