Checkpoint Firewall logs can be viewed through a Check Point Log viewer that uses icons and colors in the log table to represent different security events and their severity. What does the icon in the checkpoint logs represent?
According to EC-Council network forensic module notes, this icon represents' The firewall rejected a connection. ' Therefore the answer should be A.The firewall rejected a connection
The red circle with a white bar (prohibited sign) corresponds to "Connection Rejected" in Check Point logs, as described in the provided table.
A: Correct. Matches the icon and "Connection Rejected" description.
B: Incorrect. Virus detection has a different icon (a red shield).
C: Incorrect. Dropped connections use a red arrow pointing downward.
D: Incorrect. Spam detection uses an envelope icon with marks.
CITATION:
(EC-Council, 2021-03-01)
Page 826
EC-Council. (2021-03-01). Computer Hacking Forensics Investigator (CHFI) Version 10, 10th Edition. [[VitalSource Bookshelf version]]. Retrieved from vbk://9781635676969
Not C. Icon for Drop doesn't have an dash.
A < Icon matches a reject action.
https://community.checkpoint.com/t5/Security-Gateways/Meaning-of-Reject-in-Log/td-p/183071
Answer is A. CHFI v10 online Module 08 Page 826.
The icon for rejected connection is a red dash- as per the module.
The icon for dropped icon is round so C. is not correct.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
T__
Highly Voted 2 years, 9 months agohisham
1 year, 5 months ago044f354
Most Recent 4 months agoElb
6 months agomarymayhem
1 year, 3 months agoComeduze
1 year, 10 months ago