Exam 2: Check Point Certified Security Administrator (CCSA R80)

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The position of an implied rule is manipulated in the __________________ window.

Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
Verified

C

Which utility shows the security gateway general system information statistics like operating system information and resource usage, and individual software blade statistics of VPN, Identity Awareness and DLP?

Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
Verified

C

Which of the following describes how Threat Extraction functions?

Free
(Multiple Choice)
4.7/5
(40)
Correct Answer:
Verified

B

Your manager requires you to setup a VPN to a new business partner site. The administrator from the partner site gives you his VPN settings and you notice that he setup AES 128 for IKE phase 1 and AES 256 for IKE phase 2. Why is this a problematic setup?

(Multiple Choice)
4.8/5
(36)

You have enabled "Extended Log" as a tracking option to a security rule. However, you are still not seeing any data type information. What is the MOST likely reason?

(Multiple Choice)
4.9/5
(40)

Ken wants to obtain a configuration lock from other administrator on R80 Security Management Server. He can do this via WebUI or a via CLI. Which command should be use in CLI? Choose the correct answer.

(Multiple Choice)
4.7/5
(31)

There are two R77.30 Security Gateways in the Firewall Cluster. They are named FW_A and FW_B. The cluster is configured to work as HA (High availability) with default cluster configuration. FW_A is configured to have higher priority than FW_B. FW_A was active and processing the traffic in the morning. FW_B was standby. Around 1100 am, its interfaces went down and this caused a failover. FW_B became active. After an hour, FW_A's interface issues were resolved and it became operational. When it re-joins the cluster, will it become active automatically?

(Multiple Choice)
4.9/5
(45)

Which of the following is NOT a valid configuration screen of an Access Role Object?

(Multiple Choice)
4.9/5
(41)

What data MUST be supplied to the SmartConsole System Restore window to restore a backup?

(Multiple Choice)
4.8/5
(39)

Which of the following is NOT an advantage to using multiple LDAP servers?

(Multiple Choice)
4.9/5
(32)

How would you determine the software version from the CLI?

(Multiple Choice)
4.9/5
(40)

Fill in the blank: Each cluster has __________ interfaces.

(Multiple Choice)
4.8/5
(34)

R80.10 management server can manage gateways with which versions installed?

(Multiple Choice)
4.8/5
(34)

The IT Management team is interested in the new features of the Check Point R80.x Management and wants to upgrade but they are concerned that the existing R77.30 Gaia Gateways cannot be managed by R80.x because it is so different. As the administrator responsible for the Firewalls, how can you answer or confirm these concerns?

(Multiple Choice)
4.8/5
(45)

Which NAT rules are prioritized first?

(Multiple Choice)
4.8/5
(33)

Which Check Point software blade prevents malicious files from entering a network using virus signatures and anomaly-based protections from ThreatCloud?

(Multiple Choice)
4.9/5
(36)

How can the changes made by an administrator before publishing the session be seen by a superuser administrator?

(Multiple Choice)
4.9/5
(31)

What are types of Check Point APIs available currently as part of R80.10 code?

(Multiple Choice)
4.7/5
(26)

To ensure that VMAC mode is enabled, which CLI command you should run on all cluster members?

(Multiple Choice)
4.7/5
(31)

Which command can you use to enable or disable multi-queue per interface?

(Multiple Choice)
4.8/5
(38)
Showing 1 - 20 of 676
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)