What are the Threat Prevention software components available on the Check Point Security Gateway?
By default, what type of rules in the Access Control rulebase allow the control connections?
Which Check Point process provides logging services, such as forwarding logs from Gateway to Log Server, providing Log Export API (LEA) & Event Logging API (EL-A) services.
From SecureXL perspective, what are the three paths of traffic flow: