What is true about the IPS-Blade?
A . in R80, IPS is managed by the Threat Prevention Policy
B . in R80, in the IPS Layer, the only three possible actions are Basic, Optimized and Strict
C . in R80, IPS Exceptions cannot be attached to “all rules”
D . in R80, the GeoPolicy Exceptions and the Threat Prevention Exceptions are the same
Answer: A
Explanation:
In R80, IPS is managed by the Threat Prevention Policy567. The Threat Prevention Policy defines how to protect the network from malicious traffic using IPS, Anti-Bot, Anti-Virus, and Threat Emulation software blades5. The IPS layer in the Threat Prevention Policy allows configuring IPS protections and actions for different network segments5. The other options are not true about the IPS-Blade.
Reference: Check Point IPS Datasheet, Check Point IPS Software Blade, Quantum Intrusion Prevention System (IPS)
Latest 156-215.81.20 Dumps Valid Version with 369 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund