Fill in the blank: The IPS policy for pre-R80 gateways is installed during the_________.
A. Firewall policy install
B. Threat Prevention policy install
C. Anti-bot policy install
D. Access Control policy install
Fill in the blank: The IPS policy for pre-R80 gateways is installed during the_________.
A. Firewall policy install
B. Threat Prevention policy install
C. Anti-bot policy install
D. Access Control policy install
Installing the Threat Prevention Policy
The Anti-Bot, Anti-Virus and Threat Emulation Software Blades have a dedicated Threat Prevention policy. You can install this policy separately from the policy installation of the Access Control Software Blades. Install only the Threat Prevention policy to minimize the performance impact on the Security Gateways.
Settings for the IPS Software Blade are installed with the Access Control policy.
You can update the IPS, Anti-Bot, Anti-Virus and Threat Emulation Rule Base to give immediate coverage for new malware threats.
The correct answer is D:
IPS – There is a dedicated layer for the IPS Rule Base for pre-R80 gateways. After you make changes to IPS, install the Access Control policy.
Reference:
https://sc1.checkpoint.com/documents/R80/CP_R80BC_ThreatPrevention/html_frameset.htm?topic=documents/R80/CP_R80BC_ThreatPrevention/136486