CCSA

CCSA

University

50 Qs

quiz-placeholder

Similar activities

IoT Knowledge Quiz

IoT Knowledge Quiz

University

54 Qs

Intro to Computing

Intro to Computing

University

50 Qs

Cloud Computing (Unit 1)

Cloud Computing (Unit 1)

University

50 Qs

Second Semester

Second Semester

University

50 Qs

finals

finals

University

45 Qs

Daily Test 1-FN

Daily Test 1-FN

University

50 Qs

Quiz on C Operators

Quiz on C Operators

University

49 Qs

marketing căn bản

marketing căn bản

University

50 Qs

CCSA

CCSA

Assessment

Quiz

Computers

University

Hard

Created by

yoon yoon

Used 8+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What are the three authentication methods for SIC?

A. Passwords, Users, and standards-based SSL for the creation of security channels

B. Certificates, standards-based SSL for the creation of secure channels, and 3DES or AES128 for encryption

C. Packet Filtering, certificates, and 3DES or AES128 for encryption

D. Certificates, Passwords, and Tokens

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You have enabled “Full Log” as a tracking option to a security rule. However, you are still not seeing any data type information. What is the MOST likely reason?

A. Logging has disk space issues. Change logging storage options on the logging server or Security Management Server properties and install database

B. Data Awareness is not enabled

C. Identity Awareness is not enabled.

D. Logs are arriving from Pre-R80 gateways.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An identity server uses a ___________ for user authentication.

A. Shared secret

B. Certificate

C. One-time password

D. Token

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

After trust has been established between the Check Point components, what is TRUE about name and IP-address changes?

A. Security Gateway IP-address cannot be changed without re-establishing the trust

B. The Security Gateway name cannot be changed in command line without re-establishing trust

C. The Security Management Server name cannot be changed in SmartConsole without re-establishing trust

D. The Security Management Server IP-address cannot be changed without re-establishing the trust

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

To create policy for traffic to or from a particular location, use the _____________.

A. DLP shared policy

B. Geo policy shared policy

C. Mobile Access software blade

D. HTTPS inspection

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which GUI tool can be used to view and apply Check Point licenses?

A. cpconfig

B. Management Command Line

C. SmartConsole

D. SmartUpdate

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Tom has connected to the R80 Management Server remotely using SmartConsole and is in the process of making some Rule Base changes, when he suddenly loses connectivity. Connectivity is restored shortly afterward. What will happen to the changes already made:

A. Tom’s changes will have been stored on the Management when he reconnects and he will not lose any of this work

B. Tom will have to reboot his SmartConsole computer, and access the Management cache store on that computer, which is only accessible after a reboot.

C. Tom’s changes will be lost since he lost connectivity and he will have to start again.

D. Tom will have to reboot his SmartConsole computer, clear the cache and restore changes.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?