Checkpoint Related Exams
156-215.77 Exam
Which statement below describes the most correct strategy for implementing a Rule Base?
You find a suspicious connection from a problematic host. You decide that you want to block everything from that whole network, not just the problematic host. You want to block this for an hour while you investigate further, but you do not want to add any rules to the Rule Base.
How do you achieve this?