Exam 2: Check Point Certified Security Administrator (CCSA R80)

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Consider the Global Properties following settings: Consider the Global Properties following settings:   The selected option Accept Domain Name over UDP (Queries) means: The selected option "Accept Domain Name over UDP (Queries)" means:

(Multiple Choice)
4.8/5
(33)

What Check Point technologies deny or permit network traffic?

(Multiple Choice)
4.8/5
(41)

Browser-based Authentication sends users to a web page to acquire identities using ________ .

(Multiple Choice)
4.8/5
(37)

Which firewall daemon is responsible for the FW CLI commands?

(Multiple Choice)
4.9/5
(42)

Which of the following actions do NOT take place in IKE Phase 1?

(Multiple Choice)
4.9/5
(40)

With the User Directory Software Blade, you can create R80 user definitions on a(an) ___________ Server.

(Multiple Choice)
4.8/5
(41)

You want to establish a VPN, using certificates. Your VPN will exchange certificates with an external partner. Which of the following activities sh you do first?

(Multiple Choice)
4.9/5
(36)

What type of NAT is a one-to-one relationship where each host is translated to a unique address?

(Multiple Choice)
4.8/5
(43)

Packages and licenses are loaded from all of theses sources EXCEPT

(Multiple Choice)
4.7/5
(37)

What happens if the identity of a user is known?

(Multiple Choice)
4.8/5
(36)

What statement is true regarding Visitor Mode?

(Multiple Choice)
4.9/5
(41)

Fill in the blank: The tool _______ generates a R80 Security Gateway configuration report.

(Multiple Choice)
4.9/5
(35)

Choose what BEST describes the Policy Layer Traffic Inspection.

(Multiple Choice)
4.8/5
(32)

Which of the following licenses are considered temporary?

(Multiple Choice)
4.8/5
(40)

Which tool CANNOT be launched from SmartUpdate R77?

(Multiple Choice)
4.9/5
(30)

One of major features in R80.x SmartConsole is concurrent administration. Which of the following is NOT possible considering that AdminA, AdminB, and AdminC are editing the same Security Policy?

(Multiple Choice)
4.8/5
(32)

To enforce the Security Policy correctly, a Security Gateway requires:

(Multiple Choice)
4.7/5
(31)

Which component functions as the Internal Certificate Authority for R77?

(Multiple Choice)
4.8/5
(38)

Which of these components does NOT require a Security Gateway R77 license?

(Multiple Choice)
4.7/5
(35)

Which of the following is an identity acquisition method that allows a Security Gateway to identify Active Directory users and computers?

(Multiple Choice)
4.8/5
(37)
Showing 161 - 180 of 676
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)