B
The purpose of a Stealth Rule is to drop any traffic destined for the firewall that is not otherwise explicitly allowed, p. 32.
A Stealth Rule is usually placed at the top of the rule base, before any other rule that
allows traffic to the Security Gateway, p. 13.
A Stealth Rule is not used to hide a server’s IP address, to allow administrators to access SmartDashboard, or to drop any traffic that is not explicitly allowed.
Reference: Check Point CCSA - R81: Practice Test & Explanation, 156-315.81 Checkpoint Exam Info and Free Practice Test
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
26e1724
3 months agosivaN9
6 months, 1 week ago1ca883b
7 months agoDidesouzads
7 months, 1 week ago