Exam 2: Check Point Certified Security Administrator (CCSA R80)
Exam 1: Check Point Certified Security Principles Associate (CCSPA)60 Questions
Exam 2: Check Point Certified Security Administrator (CCSA R80)676 Questions
Exam 3: Check Point Certified Security Expert - R80340 Questions
Select questions type
Which is NOT an encryption algorithm that can be used in an IPSEC Security Association (Phase 2)?
(Multiple Choice)
4.8/5
(44)
Fill in the blank: ________information is included in the "Full Log" tracking option, but is not included in the "Log" tracking option?
(Multiple Choice)
4.7/5
(35)
There are 4 ways to use the Management API for creating host object with R80 Management API. Which one is NOT correct?
(Multiple Choice)
4.7/5
(39)
Which application should you use to install a contract file?
(Multiple Choice)
4.9/5
(31)
The "Hit count" feature allows tracking the number of connections that each rule matches. Will the Hit count feature work independently from logging and Track the hits even if the Track option is set to "None"?
(Multiple Choice)
4.7/5
(44)
Which options are given on features, when editing a Role on Gaia Platform?
(Multiple Choice)
4.9/5
(45)
When configuring LDAP User Directory integration, changes applied to a User Directory template are:
(Multiple Choice)
4.9/5
(32)
Which command is used to add users to or from existing roles?
(Multiple Choice)
4.9/5
(38)
Which type of Check Point license is tied to the IP address of a specific Security Gateway and cannot be transferred to a gateway that has a different IP address?
(Multiple Choice)
4.8/5
(37)
What is the most complete definition of the difference between the Install Policy button on the SmartConsole's tab, and the Install Policy within a specific policy?
(Multiple Choice)
4.8/5
(32)
When a Security Gateway sends its logs to an IP address other than its own, which deployment option is installed?
(Multiple Choice)
4.9/5
(29)
Which authentication scheme requires a user to possess a token?
(Multiple Choice)
4.8/5
(30)
Which SmartConsole tab shows logs and detects security threats, providing a centralized display of potential attack patterns from all network devices?
(Multiple Choice)
4.7/5
(36)
What is the default time length that Hit Count Data is kept?
(Multiple Choice)
4.9/5
(36)
Please choose correct command syntax to add an "emailserver1" host with IP address 10.50.23.90 using GAiA management CLI?
(Multiple Choice)
4.9/5
(31)
Which of the following is an authentication method used for Identity Awareness?
(Multiple Choice)
4.7/5
(29)
How is communication between different Check Point components secured in R80? As with all questions, select the best answer.
(Multiple Choice)
4.8/5
(31)
When installing a dedicated R80 SmartEvent server, what is the recommended size of the root partition?
(Multiple Choice)
4.7/5
(31)
Showing 421 - 440 of 676
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)