CCSA

CCSA

University

50 Qs

quiz-placeholder

Similar activities

Data Communication and Network

Data Communication and Network

11th Grade - University

50 Qs

NETWORK HARDWARE

NETWORK HARDWARE

University - Professional Development

55 Qs

Midterm Examination (II-BINS)

Midterm Examination (II-BINS)

University

50 Qs

A+1101 P2

A+1101 P2

University

50 Qs

Power BI Quiz

Power BI Quiz

University

50 Qs

220 1001 Day 12

220 1001 Day 12

University

47 Qs

SOAL ASAT KEJURUAN KELAS 11

SOAL ASAT KEJURUAN KELAS 11

11th Grade - University

50 Qs

Network III.

Network III.

University

49 Qs

CCSA

CCSA

Assessment

Quiz

Computers

University

Hard

Created by

yoon yoon

Used 8+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What are the three authentication methods for SIC?

A. Passwords, Users, and standards-based SSL for the creation of security channels

B. Certificates, standards-based SSL for the creation of secure channels, and 3DES or AES128 for encryption

C. Packet Filtering, certificates, and 3DES or AES128 for encryption

D. Certificates, Passwords, and Tokens

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You have enabled “Full Log” as a tracking option to a security rule. However, you are still not seeing any data type information. What is the MOST likely reason?

A. Logging has disk space issues. Change logging storage options on the logging server or Security Management Server properties and install database

B. Data Awareness is not enabled

C. Identity Awareness is not enabled.

D. Logs are arriving from Pre-R80 gateways.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An identity server uses a ___________ for user authentication.

A. Shared secret

B. Certificate

C. One-time password

D. Token

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

After trust has been established between the Check Point components, what is TRUE about name and IP-address changes?

A. Security Gateway IP-address cannot be changed without re-establishing the trust

B. The Security Gateway name cannot be changed in command line without re-establishing trust

C. The Security Management Server name cannot be changed in SmartConsole without re-establishing trust

D. The Security Management Server IP-address cannot be changed without re-establishing the trust

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

To create policy for traffic to or from a particular location, use the _____________.

A. DLP shared policy

B. Geo policy shared policy

C. Mobile Access software blade

D. HTTPS inspection

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which GUI tool can be used to view and apply Check Point licenses?

A. cpconfig

B. Management Command Line

C. SmartConsole

D. SmartUpdate

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Tom has connected to the R80 Management Server remotely using SmartConsole and is in the process of making some Rule Base changes, when he suddenly loses connectivity. Connectivity is restored shortly afterward. What will happen to the changes already made:

A. Tom’s changes will have been stored on the Management when he reconnects and he will not lose any of this work

B. Tom will have to reboot his SmartConsole computer, and access the Management cache store on that computer, which is only accessible after a reboot.

C. Tom’s changes will be lost since he lost connectivity and he will have to start again.

D. Tom will have to reboot his SmartConsole computer, clear the cache and restore changes.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?