Exam 2: Check Point Certified Security Administrator (CCSA R80)

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is a role of Publishing?

(Multiple Choice)
4.9/5
(39)

Which is a suitable command to check whether Drop Templates are activated or not?

(Multiple Choice)
4.9/5
(42)

MegaCorp's security infrastructure separates Security Gateways geographically. You must request a central license for one remote Security Gateway. How do you apply the license?

(Multiple Choice)
4.8/5
(41)

When a packet arrives at the gateway, the gateway checks it against the rules in the top Policy Layer, sequentially from top to bottom, and enforces the first rule that matches a packet. Which of the following statements about the order of rule enforcement is true?

(Multiple Choice)
4.8/5
(42)

What is NOT an advantage of Stateful Inspection?

(Multiple Choice)
4.9/5
(38)

A security Policy is created in _________ , stored in the _________ , and Distributed to the various __________ .

(Multiple Choice)
4.7/5
(30)

From the Gaia web interface, which of the following operations CANNOT be performed on a Security Management Server?

(Multiple Choice)
4.8/5
(34)

Which statement describes what Identity Sharing is in Identity Awareness?

(Multiple Choice)
4.9/5
(32)

Mesh and Star are two types of VPN topologies. Which statement below is TRUE about these types of communities?

(Multiple Choice)
4.7/5
(45)

Choose what BEST describes the reason why querying logs now is very fast.

(Multiple Choice)
4.9/5
(35)

R80 SmartConsole is supported by which of the following operating systems:

(Multiple Choice)
4.9/5
(33)

Which command is used to obtain the configuration lock in Gaia?

(Multiple Choice)
4.9/5
(39)

Which of these statements describes the Check Point ThreatCloud?

(Multiple Choice)
5.0/5
(30)

Fill in the blank: In Security Gateways R75 and above, SIC uses ______________ for encryption.

(Multiple Choice)
4.9/5
(29)

What are the steps to configure the HTTPS Inspection Policy?

(Multiple Choice)
4.8/5
(34)

Which icon indicates that read/write access is enabled?

(Multiple Choice)
4.9/5
(37)

What is UserCheck?

(Multiple Choice)
5.0/5
(27)

Which of the following commands is used to monitor cluster members?

(Multiple Choice)
4.8/5
(35)

To fully enable Dynamic Dispatcher on a Security Gateway:

(Multiple Choice)
4.7/5
(28)

At what point is the Internal Certificate Authority (ICA) created?

(Multiple Choice)
4.8/5
(43)
Showing 341 - 360 of 676
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)