<< Prev Question Next Question >>

Question 23/44

Wayne configures an HTTP Security Server to work with the content vectoring protocol to screen forbidden sites. He has created a URI resource object using CVP with the following settings:
Use CVP
Allow CVP server to modify content
Return data after content is approved
He adds two rules to his Rule Base: one to inspect HTTP traffic going to known forbidden sites, the other to allow all other HTTP traffic.
Wayne sees HTTP traffic going to those problematic sites is not prohibited.
What could cause this behavior?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (44q)
Question 1: In a distributed VPN-1 Pro NGX environment, where is the Int...
Question 2: Assume an intruder has compromised your current IKE Phase 1 ...
Question 3: Which Security Server can perform authentication tasks, but ...
Question 4: The following is cphaprob state command output from a Cluste...
Question 5: How do you control the maximum mail messages in a spool dire...
Question 6: What is a requirement for setting up Management High Availab...
Question 7: How can you completely tear down a specific VPN tunnel in an...
Question 8: How can you prevent delay-sensitive applications, such as vi...
Question 9: The following diagram illustrates how a VPN-1 SecureClient u...
Question 10: Which OPSEC server is used to prevent users from accessing c...
Question 11: Your network includes ClusterXL running Multicast mode on tw...
Question 12: How would you configure a rule in a Security Policy to allow...
Question 13: You want to block corporate-internal-net and localnet from a...
Question 14: You are running a VPN-1 NG with Application Intelligence R54...
Question 15: In a Load Sharing Unicast mode scenario, the internal-cluste...
Question 16: Barak is a Security Administrator for an organization that h...
Question 17: You want VPN traffic to match packets from internal interfac...
Question 18: Where can a Security Administrator adjust the unit of measur...
Question 19: You have two Nokia Appliances: one IP530 and one IP380. Both...
Question 20: You are reviewing SmartView Tracker entries, and see a Conne...
Question 21: In a Management High Availability (HA) configuration, you ca...
Question 22: You want only RAS signals to pass through H.323 Gatekeeper a...
Question 23: Wayne configures an HTTP Security Server to work with the co...
Question 24: You are preparing to deploy a VPN-1 Pro Gateway for VPN-1 NG...
Question 25: You configure a Check Point QoS Rule Base with two rules: an...
Question 26: Cody is notified by blacklist.org that his site has been rep...
Question 27: You plan to incorporate OPSEC servers, such as Websense and ...
Question 28: A cluster contains two members, with external interfaces 172...
Question 29: Which of the following commands shows full synchronization s...
Question 30: If you check the box "Use Aggressive Mode", in the IKE Prope...
Question 31: How does a standby SmartCenter Server receive logs from all ...
Question 32: Which type of service should a Security Administrator use in...
Question 33: Regarding QoS guarantees and limits, which of the following ...
Question 34: Which Check Point QoS feature allows a Security Administrato...
Question 35: What type of packet does a VPN-1 SecureClient send to its Po...
Question 36: Which Check Point QoS feature marks the Type of Service (ToS...
Question 37: Steve tries to configure Directional VPN Rule Match in the R...
Question 38: The following rule contains an FTP resource object in the Se...
Question 39: Your primary SmartCenter Server is installed on a SecurePlat...
Question 40: Yoav is a Security Administrator preparing to implement a VP...
Question 41: Which Security Server can perform content-security tasks, bu...
Question 42: The following configuration is for VPN-1 NGX:Is this configu...
Question 43: VPN-1 NGX supports VoIP traffic in all of the following envi...
Question 44: In a distributed VPN-1 Pro NGX environment, where is the Int...