CCSA

CCSA

University

50 Qs

quiz-placeholder

Similar activities

AWS+++

AWS+++

University

50 Qs

Pre-Knowledge for IMIoT

Pre-Knowledge for IMIoT

University

45 Qs

QCM sur les Microservices

QCM sur les Microservices

University

52 Qs

Quiz routing dinamis

Quiz routing dinamis

KG - Professional Development

45 Qs

Devops Quiz

Devops Quiz

University

50 Qs

PVP_Operators in C

PVP_Operators in C

University

50 Qs

NET102 FINAL EXAMINATION

NET102 FINAL EXAMINATION

University

50 Qs

BPDM | Final Exams

BPDM | Final Exams

University

50 Qs

CCSA

CCSA

Assessment

Quiz

Computers

University

Hard

Created by

yoon yoon

Used 8+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What are the three authentication methods for SIC?

A. Passwords, Users, and standards-based SSL for the creation of security channels

B. Certificates, standards-based SSL for the creation of secure channels, and 3DES or AES128 for encryption

C. Packet Filtering, certificates, and 3DES or AES128 for encryption

D. Certificates, Passwords, and Tokens

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You have enabled “Full Log” as a tracking option to a security rule. However, you are still not seeing any data type information. What is the MOST likely reason?

A. Logging has disk space issues. Change logging storage options on the logging server or Security Management Server properties and install database

B. Data Awareness is not enabled

C. Identity Awareness is not enabled.

D. Logs are arriving from Pre-R80 gateways.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An identity server uses a ___________ for user authentication.

A. Shared secret

B. Certificate

C. One-time password

D. Token

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

After trust has been established between the Check Point components, what is TRUE about name and IP-address changes?

A. Security Gateway IP-address cannot be changed without re-establishing the trust

B. The Security Gateway name cannot be changed in command line without re-establishing trust

C. The Security Management Server name cannot be changed in SmartConsole without re-establishing trust

D. The Security Management Server IP-address cannot be changed without re-establishing the trust

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

To create policy for traffic to or from a particular location, use the _____________.

A. DLP shared policy

B. Geo policy shared policy

C. Mobile Access software blade

D. HTTPS inspection

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which GUI tool can be used to view and apply Check Point licenses?

A. cpconfig

B. Management Command Line

C. SmartConsole

D. SmartUpdate

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Tom has connected to the R80 Management Server remotely using SmartConsole and is in the process of making some Rule Base changes, when he suddenly loses connectivity. Connectivity is restored shortly afterward. What will happen to the changes already made:

A. Tom’s changes will have been stored on the Management when he reconnects and he will not lose any of this work

B. Tom will have to reboot his SmartConsole computer, and access the Management cache store on that computer, which is only accessible after a reboot.

C. Tom’s changes will be lost since he lost connectivity and he will have to start again.

D. Tom will have to reboot his SmartConsole computer, clear the cache and restore changes.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?