CCSA

CCSA

University

50 Qs

quiz-placeholder

Similar activities

Berpikir Komputasi

Berpikir Komputasi

University

50 Qs

Modules 1-2

Modules 1-2

University

53 Qs

Information Technology, the Internet, and You

Information Technology, the Internet, and You

12th Grade - University

46 Qs

220 - 901 Test 2

220 - 901 Test 2

University

47 Qs

FINAL EXAM: LIVING IN THE IT ERA

FINAL EXAM: LIVING IN THE IT ERA

University

50 Qs

NILAI KUIS PERTAMA

NILAI KUIS PERTAMA

University - Professional Development

50 Qs

ICT 151-200

ICT 151-200

University

50 Qs

PHP Basics

PHP Basics

University

54 Qs

CCSA

CCSA

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

yoon yoon

Used 8+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What are the three authentication methods for SIC?

A. Passwords, Users, and standards-based SSL for the creation of security channels

B. Certificates, standards-based SSL for the creation of secure channels, and 3DES or AES128 for encryption

C. Packet Filtering, certificates, and 3DES or AES128 for encryption

D. Certificates, Passwords, and Tokens

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You have enabled “Full Log” as a tracking option to a security rule. However, you are still not seeing any data type information. What is the MOST likely reason?

A. Logging has disk space issues. Change logging storage options on the logging server or Security Management Server properties and install database

B. Data Awareness is not enabled

C. Identity Awareness is not enabled.

D. Logs are arriving from Pre-R80 gateways.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An identity server uses a ___________ for user authentication.

A. Shared secret

B. Certificate

C. One-time password

D. Token

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

After trust has been established between the Check Point components, what is TRUE about name and IP-address changes?

A. Security Gateway IP-address cannot be changed without re-establishing the trust

B. The Security Gateway name cannot be changed in command line without re-establishing trust

C. The Security Management Server name cannot be changed in SmartConsole without re-establishing trust

D. The Security Management Server IP-address cannot be changed without re-establishing the trust

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

To create policy for traffic to or from a particular location, use the _____________.

A. DLP shared policy

B. Geo policy shared policy

C. Mobile Access software blade

D. HTTPS inspection

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which GUI tool can be used to view and apply Check Point licenses?

A. cpconfig

B. Management Command Line

C. SmartConsole

D. SmartUpdate

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Tom has connected to the R80 Management Server remotely using SmartConsole and is in the process of making some Rule Base changes, when he suddenly loses connectivity. Connectivity is restored shortly afterward. What will happen to the changes already made:

A. Tom’s changes will have been stored on the Management when he reconnects and he will not lose any of this work

B. Tom will have to reboot his SmartConsole computer, and access the Management cache store on that computer, which is only accessible after a reboot.

C. Tom’s changes will be lost since he lost connectivity and he will have to start again.

D. Tom will have to reboot his SmartConsole computer, clear the cache and restore changes.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?