Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 156-560 All Questions

View all questions & answers for the 156-560 exam

Exam 156-560 topic 1 question 42 discussion

Actual exam question from Checkpoint's 156-560
Question #: 42
Topic #: 1
[All 156-560 Questions]

What are two basic rules Check Point recommends for building an effective policy?

  • A. Cleanup and Stealth Rule
  • B. VPN and Admin Rules
  • C. Implicit and Explicit Rules
  • D. Access and Identity Rules
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
cbaeza89
10 months, 1 week ago
Selected Answer: A
A: Kortex Page 261 "Cleanup and Stealth Rules"
upvoted 1 times
...
Dumpman6767
1 year, 5 months ago
Selected Answer: A
Correct Answer is A
upvoted 2 times
...
rorgulan
1 year, 9 months ago
Selected Answer: A
Correct A. Best Practice - These are basic Access Control rules we recommend for all Rule Bases: Stealth rule that prevents direct access to the Security Gateway Cleanup rule that drops all traffic that is not matched by the earlier rules in the policy
upvoted 2 times
...
Freelancer
1 year, 9 months ago
A is the right one.
upvoted 2 times
...
Bomski
1 year, 11 months ago
Selected Answer: A
a = cleanup + stealh
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...