Exam 2: Check Point Certified Security Administrator (CCSA R80)
Exam 1: Check Point Certified Security Principles Associate (CCSPA)60 Questions
Exam 2: Check Point Certified Security Administrator (CCSA R80)676 Questions
Exam 3: Check Point Certified Security Expert - R80340 Questions
Select questions type
When tunnel test packets no longer invoke a response, SmartView Monitor displays _____________ for the given VPN tunnel.
(Multiple Choice)
4.8/5
(31)
Vanessa is expecting a very important Security Report. The Document should be sent as an attachment via e-mail. An e-mail with Security_report.pdf file was delivered to her e-mail inbox. When she opened the PDF file, she noticed that the file is basically empty and only few lines of text are in it. The report is missing some graphs, tables and links. Which component of SandBlast protection is her company using on a Gateway?
(Multiple Choice)
4.9/5
(43)
Using mgmt_cli, what is the correct syntax to import a host object called Server_1 from the CLI?
(Multiple Choice)
4.9/5
(43)
As a Security Administrator, you must refresh the Client Authentication authorized time-out every time a new user connection is authorized. How do you do this? Enable the Refreshable Timeout setting:
(Multiple Choice)
4.8/5
(31)
Which of the following is NOT a valid deployment option for R80?
(Multiple Choice)
4.7/5
(41)
Which Check Point software blade provides Application Security and identity control?
(Multiple Choice)
4.8/5
(40)
Which SmartConsole tab shows logs and detects security threats, providing a centralized display of potential attack patterns from all network devices?
(Multiple Choice)
4.7/5
(34)
You are going to upgrade from R77 to R80. Before the upgrade, you want to back up the system so that, if there are any problems, you can easily restore to the old version with all configuration and management files intact. What is the BEST backup method in this scenario?
(Multiple Choice)
4.9/5
(39)
During the Check Point Stateful Inspection Process, for packets that do not pass Firewall Kernel Inspection and are rejected by the rule definition, packets are:
(Multiple Choice)
4.9/5
(41)
In Security Gateways, SIC uses ______________ for encryption.
(Multiple Choice)
4.8/5
(36)
What are the two types of NAT supported by the Security Gateway?
(Multiple Choice)
4.9/5
(42)
Which of the following blades is NOT subscription-based and therefore does not have to be renewed on a regular basis?
(Multiple Choice)
4.7/5
(31)
Which repositories are installed on the Security Management Server by SmartUpdate?
(Multiple Choice)
4.8/5
(38)
The R80 utility fw monitor is used to troubleshoot _____________
(Multiple Choice)
4.8/5
(37)
Which path below is available only when CoreXL is enabled?
(Multiple Choice)
4.7/5
(36)
An administrator is creating an IPsec site-to-site VPN between his corporate office and branch office. Both offices are protected by Check Point Security Gateway managed by the same Security Management Server (SMS). While configuring the VPN community to specify the pre-shared secret, the administrator did not find a box to input the pre-shared secret. Why does it not allow him to specify the pre-shared secret?
(Multiple Choice)
4.7/5
(40)
Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?
(Multiple Choice)
4.8/5
(30)
In the Check Point Security Management Architecture, which component(s) can store logs?
(Multiple Choice)
4.8/5
(38)
Showing 441 - 460 of 676
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)