CCSA R80.10 - Chapter 1&2 Test | 100 Questions with 100% Correct Answers
Which components can store logs on the Check Point Secure Management Architecture? - Security Management Server and Security Gateway What SIC uses for encryption On R71 Security Gateways and above? - AES128 The Gaia command that turns the computer off? - halt What Check Point technologies deny or permit network traffic? - Packet filtering, stateful inspection, application level firewalls aka blades The advantages of Check Point Security Architectures? - These entities are configured, managed, and monitored through a single management console which provides the flexibility needed for organizations of all shapes and sizes to manage and secure their network Which type of attack can a firewall NOT prevent? - Threat emulation (zero day) attacks - too new no definition or defenses, yet. Which technology extracts detailed information from packets and stores that information in state tables? - Inspect engine. Monitors connection state for trustworthiness, generates dynamic state tables. The three authentication methods for SIC? - Certificates, Standards-based TLS for the creation of secure channels, 3DES or AES128 for encryption At what point the Internal Certificate Authority is created? - The ICA is created during the primary Security Management Server installation process. It is responsible for issuing the SIC, VPN, and User certificates
Written for
- Institution
- CCSA R80.10
- Course
- CCSA R80.10
Document information
- Uploaded on
- February 13, 2023
- Number of pages
- 13
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
ccsa r8010 chapter 1amp2 test | 100 questions with 100 correct answers
Also available in package deal