CCSA

CCSA

University

50 Qs

quiz-placeholder

Similar activities

AP CS P 5.1

AP CS P 5.1

10th Grade - University

50 Qs

Data Communication and Network

Data Communication and Network

11th Grade - University

50 Qs

IP MIDTERM

IP MIDTERM

University

45 Qs

Pendahuluan Cisco Packet Tracer

Pendahuluan Cisco Packet Tracer

University

55 Qs

Introduction to Multimedia

Introduction to Multimedia

University

45 Qs

Білім берудегі цифрлық технологиялар

Білім берудегі цифрлық технологиялар

University

50 Qs

object oriented analysis and design test2

object oriented analysis and design test2

University

50 Qs

Latihan CAT PPPK 2022 - Pemadam Kebakaran Pemula

Latihan CAT PPPK 2022 - Pemadam Kebakaran Pemula

University - Professional Development

47 Qs

CCSA

CCSA

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

yoon yoon

Used 8+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What are the three authentication methods for SIC?

A. Passwords, Users, and standards-based SSL for the creation of security channels

B. Certificates, standards-based SSL for the creation of secure channels, and 3DES or AES128 for encryption

C. Packet Filtering, certificates, and 3DES or AES128 for encryption

D. Certificates, Passwords, and Tokens

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You have enabled “Full Log” as a tracking option to a security rule. However, you are still not seeing any data type information. What is the MOST likely reason?

A. Logging has disk space issues. Change logging storage options on the logging server or Security Management Server properties and install database

B. Data Awareness is not enabled

C. Identity Awareness is not enabled.

D. Logs are arriving from Pre-R80 gateways.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An identity server uses a ___________ for user authentication.

A. Shared secret

B. Certificate

C. One-time password

D. Token

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

After trust has been established between the Check Point components, what is TRUE about name and IP-address changes?

A. Security Gateway IP-address cannot be changed without re-establishing the trust

B. The Security Gateway name cannot be changed in command line without re-establishing trust

C. The Security Management Server name cannot be changed in SmartConsole without re-establishing trust

D. The Security Management Server IP-address cannot be changed without re-establishing the trust

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

To create policy for traffic to or from a particular location, use the _____________.

A. DLP shared policy

B. Geo policy shared policy

C. Mobile Access software blade

D. HTTPS inspection

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which GUI tool can be used to view and apply Check Point licenses?

A. cpconfig

B. Management Command Line

C. SmartConsole

D. SmartUpdate

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Tom has connected to the R80 Management Server remotely using SmartConsole and is in the process of making some Rule Base changes, when he suddenly loses connectivity. Connectivity is restored shortly afterward. What will happen to the changes already made:

A. Tom’s changes will have been stored on the Management when he reconnects and he will not lose any of this work

B. Tom will have to reboot his SmartConsole computer, and access the Management cache store on that computer, which is only accessible after a reboot.

C. Tom’s changes will be lost since he lost connectivity and he will have to start again.

D. Tom will have to reboot his SmartConsole computer, clear the cache and restore changes.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?