What are two basic rules Check Point recommends for building an effective policy?
What are two basic rules Check Point recommends for building an effective policy?
To build an effective policy, Check Point recommends using the Cleanup and Stealth rules. The Stealth rule prevents unauthorized access to the Security Gateway, ensuring it is protected from direct attacks. The Cleanup rule is designed to drop any traffic that is not explicitly allowed by earlier rules in the policy, thus securing the network by ensuring only intended traffic passes through.
Correct Answer is A
Correct A. Best Practice - These are basic Access Control rules we recommend for all Rule Bases: Stealth rule that prevents direct access to the Security Gateway Cleanup rule that drops all traffic that is not matched by the earlier rules in the policy
A is the right one.
a = cleanup + stealh
A: Kortex Page 261 "Cleanup and Stealth Rules"