Suggested Answer:C🗳️
These are basic access control rules we recommend for all Rule Bases: ✑ Stealth rule that prevents direct access to the Security Gateway. ✑ Cleanup rule that drops all traffic that is not allowed by the earlier rules. There is also an implied rule that drops all traffic, but you can use the Cleanup rule to log the traffic. Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_Firewall_WebAdmin/92703.htm
from CCSA R80 guide:
Cleanup Rule — A Cleanup rule is recommended to determine how to handle
connections not matched by the rules above it in the Rule Base. It is also necessary for
logging this traffic. Cleanup rules can be configured to allow or drop the connection. It
should always be placed at the bottom of the Rule Base.
upvoted 3 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Nikolas
4 months ago