A Check Point Software license consists of two components, the Software Blade and the Software Container. There are ______ types of Software Containers: ________.
In HTTPS Inspection policy, what actions are available in the "Actions" column of a rule?
Fill in the blank: Browser-based Authentication sends users to a web page to acquire identities using ___________.
With URL Filtering, what portion of the traffic is sent to the Check Point Online Web Service for analysis?
Choose what BEST describes the reason why querying logs now are very fast.
When enabling tracking on a rule, what is the default option?