check point certified security administrator – r81.20 (ccsa)
Last exam update: Dec 15 ,2024
Page 1 out of 12. Viewing questions 1-10 out of 121
Question 1
True or False: More than one administrator can log into the Security Management Server with SmartConsole with write permission at the same time.
A.
True, every administrator works on a different database that is independent of the other administrators
B.
False, only one administrator can login with write permission
C.
True, every administrator works in a session that is independent of the other administrators
D.
False, this feature has to be enabled in the Global Properties
Answer:
c
User Votes:
A
50%
B
50%
C 1 votes
50%
D
50%
Discussions
0/ 1000
Question 2
What are the two deployment options available for a security gateway?
A.
Bridge and Switch
B.
Local and Remote
C.
Cloud and Router
D.
Standalone and Distributed
Answer:
d
User Votes:
A
50%
B
50%
C
50%
D 1 votes
50%
Discussions
0/ 1000
Question 3
The Online Activation method is available for Check Point manufactured appliances. How does the administrator use the Online Activation method?
A.
The cpinfo command must be run on the firewall with the switch -online-license-activation.
B.
Using the Gaia First Time Configuration Wizard, the appliance connects to the Check Point User Center and downloads all necessary licenses and contracts.
C.
The SmartLicensing GUI tool must be launched from the SmartConsole for the Online Activation tool to start automatically.
D.
No action is required if the firewall has internet access and a DNS server to resolve domain names.
Answer:
b
User Votes:
A
50%
B 1 votes
50%
C
50%
D
50%
Discussions
0/ 1000
Question 4
Main Mode in iKEv1 uses how many packages for negotiation?
A.
3
B.
depends on the make of the peer gateway
C.
6
D.
4
Answer:
c
User Votes:
A
50%
B
50%
C 1 votes
50%
D
50%
Discussions
0/ 1000
Question 5
What is the purpose of a Stealth Rule?
A.
A rule that allows administrators to access SmartConsole from any device.
B.
To drop any traffic destined for the firewall that is not otherwise explicitly allowed.
C.
A rule at the end of your policy to drop any traffic that is not explicitly allowed.
D.
A rule used to hide a server's IP address from the outside world.
Answer:
d
User Votes:
A
50%
B 1 votes
50%
C
50%
D
50%
Discussions
0/ 1000
Question 6
Check Point licenses come in two forms. What are those forms?
A.
Security Gateway and Security Management.
B.
On-premise and Public Cloud.
C.
Central and Local.
D.
Access Control and Threat Prevention.
Answer:
c
User Votes:
A
50%
B
50%
C 1 votes
50%
D
50%
Discussions
0/ 1000
Question 7
Fill in the blanks: In _____ NAT, Only the _____ is translated.
A.
Hide; source
B.
Simple; source
C.
Static; source
D.
Hide; destination
Answer:
a
User Votes:
A 1 votes
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 8
What default layers are included when creating a new policy layer?
A.
Application Control, URL Filtering and Threat Prevention
B.
Firewall, Application Control and IPSec VPN
C.
Firewall, Application Control and IPS
D.
Access Control, Threat Prevention and HTTPS Inspection
Answer:
c
User Votes:
A
50%
B
50%
C
50%
D 1 votes
50%
Discussions
0/ 1000
Question 9
What are two basic rules Check Point recommends for building an effective security policy?
A.
Accept Rule and Drop Rule
B.
Explicit Rule and Implied Rule
C.
Cleanup Rule and Stealth Rule
D.
NAT Rule and Reject Rule
Answer:
c
User Votes:
A
50%
B
50%
C 1 votes
50%
D
50%
Discussions
0/ 1000
Question 10
In order for changes made to policy to be enforced by a Security Gateway, what action must an administrator perform?