Exam 2: Check Point Certified Security Administrator (CCSA R80)
Exam 1: Check Point Certified Security Principles Associate (CCSPA)60 Questions
Exam 2: Check Point Certified Security Administrator (CCSA R80)676 Questions
Exam 3: Check Point Certified Security Expert - R80340 Questions
Select questions type
Which is a suitable command to check whether Drop Templates are activated or not?
(Multiple Choice)
4.9/5
(42)
MegaCorp's security infrastructure separates Security Gateways geographically. You must request a central license for one remote Security Gateway. How do you apply the license?
(Multiple Choice)
4.8/5
(41)
When a packet arrives at the gateway, the gateway checks it against the rules in the top Policy Layer, sequentially from top to bottom, and enforces the first rule that matches a packet. Which of the following statements about the order of rule enforcement is true?
(Multiple Choice)
4.8/5
(42)
A security Policy is created in _________ , stored in the _________ , and Distributed to the various __________ .
(Multiple Choice)
4.7/5
(30)
From the Gaia web interface, which of the following operations CANNOT be performed on a Security Management Server?
(Multiple Choice)
4.8/5
(34)
Which statement describes what Identity Sharing is in Identity Awareness?
(Multiple Choice)
4.9/5
(32)
Mesh and Star are two types of VPN topologies. Which statement below is TRUE about these types of communities?
(Multiple Choice)
4.7/5
(45)
Choose what BEST describes the reason why querying logs now is very fast.
(Multiple Choice)
4.9/5
(35)
R80 SmartConsole is supported by which of the following operating systems:
(Multiple Choice)
4.9/5
(33)
Which command is used to obtain the configuration lock in Gaia?
(Multiple Choice)
4.9/5
(39)
Which of these statements describes the Check Point ThreatCloud?
(Multiple Choice)
5.0/5
(30)
Fill in the blank: In Security Gateways R75 and above, SIC uses ______________ for encryption.
(Multiple Choice)
4.9/5
(29)
What are the steps to configure the HTTPS Inspection Policy?
(Multiple Choice)
4.8/5
(34)
Which of the following commands is used to monitor cluster members?
(Multiple Choice)
4.8/5
(35)
At what point is the Internal Certificate Authority (ICA) created?
(Multiple Choice)
4.8/5
(43)
Showing 341 - 360 of 676
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)