Alice & Bob are concurrently logged In via SSH on the same Check Point Security Gateway as user "admin* however Bob was first logged in and acquired the lock Alice Is not aware that Bob is also togged in to the same Security Management Server as she is but she needs to perform very urgent configuration changes - which of the following GAlAclish command is true for overriding Bobs configuration database lock:
Fill in the blank: Authentication rules are defined for ________ .
What is the correct description for the Dynamic Balancing / Split feature?
Which of the following is an authentication method used for Identity Awareness?