Which is NOT an example of a Check Point API?
How many policy layers do Access Control policy support?
Check Point security components are divided into the following components:
Tom has connected to the R81 Management Server remotely using SmartConsole and is in the process of making some Rule Base changes, when he suddenly loses connectivity. Connectivity is restored shortly afterward.
What will happen to the changes already made?