Checkpoint CCSA R70.1

35 Questions | Attempts: 184
Please wait...
Question 1 / 36
🏆 Rank #--
Score 0/100

1. Which of the following uses the same key to decrypt as it does to encrypt?

Submit
Please wait...
About This Quiz
CCSA Quizzes & Trivia

Check Point CCSA Quiz

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2. A rule _______ is designed to log and drop all other communication that does not match another rule?

Submit

3. You believe Phase 2 negotiations are railing while you are attempting to configure a site-to-site VPN with one of your firm's business pastners.  Which SmartConsol application should you use to confirm your suspicions?

Submit

4. The Check Point Security Gateway's virtual machine (kernel) exists between which two layers of the OSI model? 

Submit

5. Which the following statement is TRUE about management plug-ins?

Submit

6. If you check the box "Use Agressive Mode" in the IKE Properties dialog box, the standard:

Submit

7. The third-shift Administrator was updating Security Management Server access settings in global properties. He managed to lock all of the administrators out of their accounts. How should you unlock these accounts? 

Submit

8. Security Gateway R71 supports User Authentication for which of the following services? Select the response below that contains the most complete list of supported services.

Submit

9. Which of the following are authentication methods that Security Gateway R7Tuses to validate connection attempts? Select the response below that includes the MOST complete list of valid authentication methods.

Submit

10. You are running a R71 Security Gatewayon  SecurePlatform, in case of a harware failure.  You have a server with the exact same hardware installed.  What backup method should you use to quickly put the secondary firewall into production.

Submit

11. In SmartView tracker, which rule shows when a packet is dropped due to anti-spoofing?

Submit

12. You have created a rule Base Firewall, websydney. Now you are going to create a new policy package with security and address transaction rules for a secured gateway. What is true about the new package's NAT rules?

Submit

13. You find a suspicious connection from a problematic host. You decide that you want to block everything from the whole network, not just the problematic host. You want to block this for an hour while you investigate further, but you do not want to add any rules to the rule base. How do you achieve this?

Submit

14.   An advantage of using central instead of local licensing is: 

Submit

15. The URL Filtering Policy can be configured to monitor URLs in order to:

Submit

16. What happens hi relation to the CRL cache after a cpstop and spstart have been Initiated

Submit

17. What physical machine must have access to the User center public IP address when checking for new packages with smartUpdate

Submit

18. For normal packet transaction of an accepted communication to a host protocol by a Security Gate Way how many lines per packet are recorded on a packet analyzer like wire Shark using fw monitor?

Submit

19. You run cpconfig to reset SIC on the Security Gateway. After the SIC reset operation is complete, the policy that will be installed is the

Submit

20. A Web server behind the Security Gateway is set to Automatic Static NAT Client side NAT is not checked in the Global Properties. A client on the Internet initiates a session to the Web Server. Assuming there is a rule allowing this traffic, what other configuration must be done to allow the traffic to reach the Web server?

Submit

21. Which port must be allowed to pass through enforcement points in order to allow packet logging to operate correctly?

Submit

22. While in Smart View Tracker, Brady has noticed some very odd network traffic that he thinks could be an intrusion. He decides to block the traffic for 60 but cannot remember all the steps. What is the correct order of steps needed to perform this? 1) Select the Active Mode tab In Smart view Tracker 2) Select Tools > Block Intruder 3) Select the Log Viewing tab in SmartView Tracker 4) Set the Blocking Time out value to 60 minutes 5) Highlight the connection he wishes to block

Submit

23.   Phase 1 uses________. 

Submit

24. When configuring the network interfaces of a checkpoint Gateway, the direction can be defined as Internal or external. What is meaning of interface leading to DMZ?

Submit

25. Which service is it NOT possible to configure user authentication?

Submit

26. What can NOT be selected for VPN tunnel sharing?

Submit

27. Which type of resource could a Security Administrator use to control access to specific share on target machines?URI

Submit

28. Latency has lost SIC communication with her Security Gateway and she needs to re establish SIC. What would be the correct order of steps needed to perform this task? 1) Create a new activation key on the Security Gateway, then exit cpconfig. 2) Click the Communication tab on the Security Gateway object, and then click Reset. 3) Run the cpconfig tool, and then select Secure Internal Communication to reset. 4) Input the new activation key in the Security Gateway object, and then click initialize 5) Run the cpconfig tool, then select source Internal Communication to reset.

Submit

29. Which answers are TRUE? Automatic Static NAT CANNOT be used when: i) NAT decision is based on the destination port ii) Source and Destination IP both have to be translated iii) The NAT rule should only be installed on a dedicated Gateway only iv) NAT should be performed on the server side

Submit

30. Which Security Servers can perform authentication tasks, but CANNOT perform content security tasks?

Submit

31. Your R71 enterprise Security Management Server is running abnormally on Windows 2003 Server. You decide to try reinstalling the Security Management Server, but you want to try keeping the critical Security Management Server configuration settings impact (i.e , all security policies database, SIC, licensing etc). What is the BEST method to reinstall the Server and keep its critical configuration?

Submit

32. You want to implement Static Destination NAT in order to provide external. Internet users access to an internal Webserver that has a reserved (RFC 1918) IP address You have an unused valid IP address on the network between your Security Gateway and ISP router. You control the router that sits between the external interface of the firewall and the Internet. What is an alternative configuration if proxy ARP cannot be used on your Security Gateway?

Submit

33. Which of these security policy changes optimize Security Gateway performance?

Submit

34. The Customer has a small Check Point installation which includes one Windows XP workstation as SmartConsole, one Solaris server working as security Management Server, and a third server running SecurePlatform as Security Gateway. This is an Example of a (n):Stand-Alone Installation.

Submit

35. Of the following, what parameters will not be preserved when using Database Revision Control

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (35)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which of the following uses the same key to decrypt as it does to...
A rule _______ is designed to log and drop all other communication...
You believe Phase 2 negotiations are railing while you are attempting...
The Check Point Security Gateway's virtual machine (kernel) exists...
Which the following statement is TRUE about management plug-ins?
If you check the box "Use Agressive Mode" in the IKE...
The third-shift Administrator was updating Security Management Server...
Security Gateway R71 supports User Authentication for which of the...
Which of the following are authentication methods that Security...
You are running a R71 Security Gatewayon  SecurePlatform, in case...
In SmartView tracker, which rule shows when a packet is dropped due to...
You have created a rule Base Firewall, websydney. Now you are going to...
You find a suspicious connection from a problematic host. You decide...
 ...
The URL Filtering Policy can be configured to monitor URLs in order...
What happens hi relation to the CRL cache after a cpstop and spstart...
What physical machine must have access to the User center public IP...
For normal packet transaction of an accepted communication to a host...
You run cpconfig to reset SIC on the Security Gateway. After the SIC...
A Web server behind the Security Gateway is set to Automatic Static...
Which port must be allowed to pass through enforcement points in order...
While in Smart View Tracker, Brady has noticed some very odd network...
  Phase 1 uses________. 
When configuring the network interfaces of a checkpoint Gateway, the...
Which service is it NOT possible to configure user authentication?
What can NOT be selected for VPN tunnel sharing?
Which type of resource could a Security Administrator use to control...
Latency has lost SIC communication with her Security Gateway and she...
Which answers are TRUE? Automatic Static NAT CANNOT be used when: ...
Which Security Servers can perform authentication tasks, but CANNOT...
Your R71 enterprise Security Management Server is running abnormally...
You want to implement Static Destination NAT in order to provide...
Which of these security policy changes optimize Security Gateway...
The Customer has a small Check Point installation which includes one...
Of the following, what parameters will not be preserved when using...
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!