Exam 2: Check Point Certified Security Administrator (CCSA R80)
Exam 1: Check Point Certified Security Principles Associate (CCSPA)60 Questions
Exam 2: Check Point Certified Security Administrator (CCSA R80)676 Questions
Exam 3: Check Point Certified Security Expert - R80340 Questions
Select questions type
John is the administrator of an R80 Security Management server managing an R77.30 Check Point Security Gateway. John is currently updating the network objects and amending the rules using SmartConsole. To make John's changes available to other administrators, and to save the database before installing a policy, what must John do?
(Multiple Choice)
4.9/5
(32)
Joey is using the computer with IP address 192.168.20.13. He wants to access web page "www.CheckPoint.com", which is hosted on Web server with IP address 203.0.113.111. How many rules on Check Point Firewall are required for this connection?
(Multiple Choice)
4.8/5
(43)
Katie has been asked to do a backup on the Blue Security Gateway. Which command would accomplish this in the Gaia CLI?
(Multiple Choice)
4.9/5
(36)
When configuring Spoof Tracking, which tracking actions can an administrator select to be done when spoofed packets are detected?
(Multiple Choice)
4.9/5
(33)
To optimize Rule Base efficiency the most hit rules should be where?
(Multiple Choice)
4.9/5
(36)
How many packets does the IKE exchange use for Phase 1 Main Mode?
(Multiple Choice)
4.9/5
(33)
Which the following type of authentication on Mobile Access can NOT be used as the first authentication method?
(Multiple Choice)
4.9/5
(40)
When launching SmartDashboard, what information is required to log into R77?
(Multiple Choice)
4.9/5
(38)
Which of the following Automatically Generated Rules NAT rules have the lowest implementation priority?
(Multiple Choice)
4.7/5
(32)
John is the administrator of a R80 Security Management server managing an R77.30 Check Point Security Gateway. John is currently updating the network objects and amending the rules using SmartConsole. To make John's changes available to other administrators, and to save the database before installing a policy, what must John do?
(Multiple Choice)
4.8/5
(34)
You find that Users are not prompted for authentication when they access their Web servers, even though you have created an HTTP rule via User Authentication. Choose the BEST reason why.
(Multiple Choice)
4.8/5
(31)
Which type of the Check Point license ties the package license to the IP address of the Security Management Server?
(Multiple Choice)
4.7/5
(37)
You are the Security Administrator for MegaCorp. In order to see how efficient your firewall Rule Base is, you would like to see how many often the particular rules match. Where can you see it? Give the BEST answer.
(Multiple Choice)
4.8/5
(29)
Showing 221 - 240 of 676
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)