CCSA EXAM UPDATED 90 QUESTIONS AND ANSWERS
Which of the following is used to extract state related info from packets and store that info in state
tables? - CORRECT ANSWER✅✅✅INSPECT engine
Which is true about Stateful Inspection? - CORRECT ANSWER✅✅✅It examines not only the headers,
but also all the content.
What are the three main components of CP Mgmt architecture? - CORRECT ANSWER✅✅✅-
SmartConsole
- Security Mgmt.
- Security Gateway
What technologies are used to deny or permit network traffic? - CORRECT ANSWER✅✅✅- Packet
Filtering
- Stateful Inspection
- Application Layer Firewall
Gaia has two users that cannot be deleted. What are those users? - CORRECT ANSWER✅✅✅Admin
and Monitor
The default shell of Gaia CLI is cli.sh. How do you change cli.sh shell to advanced shell? - CORRECT
ANSWER✅✅✅Execute 'expert' in the cli.sh shell
Which tool allows for automatic updated of Gaia OS and CheckPoint products? - CORRECT
ANSWER✅✅✅CPUSE (CheckPoint Upgrade Service Engine)
Name the pre-defined roles in Gaia OS - CORRECT ANSWER✅✅✅AdminRole, cloningAdminRole,
MonitorRole
What does "unknown" SIS status shown on SmartConsole mean? - CORRECT ANSWER✅✅✅There is
no connection b/w the Security Gateway and Security Mgmt. Server
,Secure Internal Communication (SIC) is handled by what process? - CORRECT ANSWER✅✅✅CPD
When an admin sees a lock on a gateway object and cannot edit it, what does that mean? - CORRECT
ANSWER✅✅✅A. The gateway is not powered on.
B. Incorrect routing to reach the gateway.
C. The Admin would need to login to Read-Only mode
D. Another Admin has made an edit to that object and has yet to publish the change.
Answer: D
Name the file that is an electronically signed file used by CP to translate the features in the license into
code. - CORRECT ANSWER✅✅✅cp.macro
What app is used for the central management and deployment of licenses and packages? - CORRECT
ANSWER✅✅✅SmartUpdate
What command from the CLI would be used to view the current licensing? - CORRECT
ANSWER✅✅✅cplic print
What are the two basic rules that are recommended to for building an effective security policy? -
CORRECT ANSWER✅✅✅Cleanup Rule and Stealth Rule
What are the four policy types for each policy package? - CORRECT ANSWER✅✅✅- Access Control
- Custom Threat Protection
- Autonomous Threat Prevention
- HTTPS Inspector
, Which part of the SmartConsole allows admins to add, edit, delete, and clone objects? - CORRECT
ANSWER✅✅✅Object Explorer
In order for changes to be made to a policy & be enforced by the Security Gateway, what has to
happen? - CORRECT ANSWER✅✅✅Install policy
Can you used the same layer in multiple policies or rulebases? - CORRECT ANSWER✅✅✅Yes - a layer
can be shared across multiple
What default layers are included when creating a new policy layer? - CORRECT ANSWER✅✅✅-
Access Control
- Threat Prevention
- HTTPS Inspection
When dealing with rule base layers, what two layers can be utilized? - CORRECT
ANSWER✅✅✅Ordered Layers and Inline Layers
URL Filtering employs a technology, which educates users on web usage policy in real time. What is the
name of that technology? - CORRECT ANSWER✅✅✅A. WebCheck
B. UserCheck
C. Harmony Endpoint
D. URL categorization
Answer: B
Application Control/URL Filtering database library is known as: - CORRECT ANSWER✅✅✅AppWik
In HTTPS Inspection Policy, what actions are available in the "Actions" column of a rule? - CORRECT
ANSWER✅✅✅A. "Inspect", "Bypass"
B. "Inspect", "Bypass", "Categorize"
Which of the following is used to extract state related info from packets and store that info in state
tables? - CORRECT ANSWER✅✅✅INSPECT engine
Which is true about Stateful Inspection? - CORRECT ANSWER✅✅✅It examines not only the headers,
but also all the content.
What are the three main components of CP Mgmt architecture? - CORRECT ANSWER✅✅✅-
SmartConsole
- Security Mgmt.
- Security Gateway
What technologies are used to deny or permit network traffic? - CORRECT ANSWER✅✅✅- Packet
Filtering
- Stateful Inspection
- Application Layer Firewall
Gaia has two users that cannot be deleted. What are those users? - CORRECT ANSWER✅✅✅Admin
and Monitor
The default shell of Gaia CLI is cli.sh. How do you change cli.sh shell to advanced shell? - CORRECT
ANSWER✅✅✅Execute 'expert' in the cli.sh shell
Which tool allows for automatic updated of Gaia OS and CheckPoint products? - CORRECT
ANSWER✅✅✅CPUSE (CheckPoint Upgrade Service Engine)
Name the pre-defined roles in Gaia OS - CORRECT ANSWER✅✅✅AdminRole, cloningAdminRole,
MonitorRole
What does "unknown" SIS status shown on SmartConsole mean? - CORRECT ANSWER✅✅✅There is
no connection b/w the Security Gateway and Security Mgmt. Server
,Secure Internal Communication (SIC) is handled by what process? - CORRECT ANSWER✅✅✅CPD
When an admin sees a lock on a gateway object and cannot edit it, what does that mean? - CORRECT
ANSWER✅✅✅A. The gateway is not powered on.
B. Incorrect routing to reach the gateway.
C. The Admin would need to login to Read-Only mode
D. Another Admin has made an edit to that object and has yet to publish the change.
Answer: D
Name the file that is an electronically signed file used by CP to translate the features in the license into
code. - CORRECT ANSWER✅✅✅cp.macro
What app is used for the central management and deployment of licenses and packages? - CORRECT
ANSWER✅✅✅SmartUpdate
What command from the CLI would be used to view the current licensing? - CORRECT
ANSWER✅✅✅cplic print
What are the two basic rules that are recommended to for building an effective security policy? -
CORRECT ANSWER✅✅✅Cleanup Rule and Stealth Rule
What are the four policy types for each policy package? - CORRECT ANSWER✅✅✅- Access Control
- Custom Threat Protection
- Autonomous Threat Prevention
- HTTPS Inspector
, Which part of the SmartConsole allows admins to add, edit, delete, and clone objects? - CORRECT
ANSWER✅✅✅Object Explorer
In order for changes to be made to a policy & be enforced by the Security Gateway, what has to
happen? - CORRECT ANSWER✅✅✅Install policy
Can you used the same layer in multiple policies or rulebases? - CORRECT ANSWER✅✅✅Yes - a layer
can be shared across multiple
What default layers are included when creating a new policy layer? - CORRECT ANSWER✅✅✅-
Access Control
- Threat Prevention
- HTTPS Inspection
When dealing with rule base layers, what two layers can be utilized? - CORRECT
ANSWER✅✅✅Ordered Layers and Inline Layers
URL Filtering employs a technology, which educates users on web usage policy in real time. What is the
name of that technology? - CORRECT ANSWER✅✅✅A. WebCheck
B. UserCheck
C. Harmony Endpoint
D. URL categorization
Answer: B
Application Control/URL Filtering database library is known as: - CORRECT ANSWER✅✅✅AppWik
In HTTPS Inspection Policy, what actions are available in the "Actions" column of a rule? - CORRECT
ANSWER✅✅✅A. "Inspect", "Bypass"
B. "Inspect", "Bypass", "Categorize"