Name the utility that is used to block activities that appear to be suspicious.
Name the utility that is used to block activities that appear to be suspicious.
Suspicious Activity Monitoring (SAM) is specifically designed to block activities that are deemed suspicious. It actively monitors and responds to potentially malicious behavior to prevent potential threats from causing harm.
Correct. https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_CLI_ReferenceGuide/Topics-CLIG/MDSG/fw-sam.htm