Exam 2: Check Point Certified Security Administrator (CCSA R80)

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Kofi, the administrator of the ALPHA Corp network wishes to change the default Gaia WebUI Portal port number currently set on the default HTTPS port. Which CLISH commands are required to be able to change this TCP port? Kofi, the administrator of the ALPHA Corp network wishes to change the default Gaia WebUI Portal port number currently set on the default HTTPS port. Which CLISH commands are required to be able to change this TCP port?

(Multiple Choice)
4.9/5
(33)

In the Check Point three-tiered architecture, which of the following is NOT a function of the Security Management Server (Security Management Server)?

(Multiple Choice)
4.8/5
(41)

Which one of the following is the preferred licensing model?

(Multiple Choice)
4.8/5
(45)

Which one of the following is a way that the objects can be manipulated using the new API integration in R80 Management?

(Multiple Choice)
4.8/5
(24)

To create a policy for traffic to or from a specific geographical location, use the _____________.

(Multiple Choice)
4.7/5
(33)

An Endpoint identity agent uses a ___________ for user authentication.

(Multiple Choice)
4.9/5
(44)

The organization's security manager wishes to back up just the Gaia operating system parameters such as interface details, Static routes and Proxy ARP entries. Which command would be BEST suited to accomplish this task?

(Multiple Choice)
4.8/5
(36)

A Check Point Software license consists of two components, the Software Blade and the Software Container. There are ______________ types of Software Containers: ______________.

(Multiple Choice)
5.0/5
(46)

To create policy for traffic to or from a specific geographical location, use the _____________.

(Multiple Choice)
4.9/5
(28)

When Identity Awareness is enabled, which identity source(s) is(are) used for Application Control?

(Multiple Choice)
4.7/5
(35)

Tom has been tasked to install Check Point R80 in a distributed deployment. Before Tom installs the systems this way, how many machines will he need if he does NOT include a SmartConsole machine in his calculations?

(Multiple Choice)
4.7/5
(40)

The tool _______ generates an R80 Security Gateway configuration report.

(Multiple Choice)
4.9/5
(32)

Fill in the blanks: VPN gateways authenticate using ___________ and ___________ .

(Multiple Choice)
4.9/5
(33)

Which tool is used to enable cluster membership on a Gateway?

(Multiple Choice)
4.9/5
(37)

The IPS policy for pre-R80 gateways is installed during the _______ .

(Multiple Choice)
4.9/5
(36)

Fill in the blanks: The Application Layer Firewalls inspect traffic through the ________ layer(s) of the TCP/IP model and up to and including the ________ layer.

(Multiple Choice)
4.7/5
(38)

You are unable to login to SmartDashboard. You log into the management server and run #cpwd_admin list with the following output: You are unable to login to SmartDashboard. You log into the management server and run #cpwd_admin list with the following output:   What reason could possibly BEST explain why you are unable to connect to SmartDashboard? What reason could possibly BEST explain why you are unable to connect to SmartDashboard?

(Multiple Choice)
4.9/5
(34)

Which deployment adds a Security Gateway to an existing environment without changing IP routing?

(Multiple Choice)
4.9/5
(42)

Which of the following is NOT a valid option when configuring access for Captive Portal?

(Multiple Choice)
4.7/5
(36)

What object type would you use to grant network access to an LDAP user group?

(Multiple Choice)
4.7/5
(39)
Showing 41 - 60 of 676
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)