Check Point Certified Security Administrator – R81.20 (CCSA) v1.0 Flashcards
Which of the following is a valid deployment option?
A. CloudSec deployment
B. Disliked deployment
C. Router only deployment
D. Standalone deployment
D. Standalone deployment
Using the SmartConsole, which pre-defined Permission Profile should be assigned to an administrator that requires full access to audit all configurations without modifying them?
A. Read Only All
B. Full Access
C. Editor
D. Super User
A. Read Only All
Which Check Point software blade monitors Check Point devices and provides a picture of network and security performance?
A. Logging and Status
B. Monitoring
C. Threat Emulation
D. Application Control
B. Monitoring
Which type of Check Point license ties the package license to the IP address of the Security Management Server?
A. Formal
B. Corporate
C. Central
D. Local
D. Local
Which Threat Prevention Software Blade provides protection from malicious software that can infect your network computers? Choose the BEST answer.
A. Anti-Malware
B. Content Awareness
C. Anti-Virus
D. IPS
C. Anti-Virus
URL Filtering cannot be used to:
A. Control Data Security
B. Decrease legal liability
C. Improve organizational security
D. Control Bandwidth issues
A. Control Data Security
Which one of the following is TRUE?
A. One policy can be either inline or ordered, but not both.
B. Inline layer can be defined as a rule action.
C. Ordered policy is a sub-policy within another policy.
D. Pre-R80 Gateways do not support ordered layers.
B. Inline layer can be defined as a rule action.
Fill in the blanks: A Check Point software license consists of a _____ and _____.
A. Software container; software package
B. Software package; signature
C. Signature; software blade
D. Software blade; software container
A. Software container; software package
Which of the following is used to initially create trust between a Gateway and Security Management Server?
A. One-time Password
B. Token
C. Certificate
D. Internal Certificate Authority
A. One-time Password
What are the two elements of address translation rules?
A. Original packet and translated packet
B. Manipulated packet and original packet
C. Untranslated packet and manipulated packet
D. Translated packet and untranslated packet
A. Original packet and translated packet
Which of the following log queries would show only dropped packets with source address of 192.168.1.1 and destination address of 172.26.1.1?
A. 192.168.1.1 AND 172.26.1.1 AND drop
B. src:192.168.1.1 AND dst:172.26.1.1 AND action:Drop
C. 192.168.1.1 OR 172.26.1.1 AND action:Drop
D. src:192.168.1.1 OR dst:172.26.1.1 AND action:Drop
B. src:192.168.1.1 AND dst:172.26.1.1 AND action:Drop
Fill in the blanks: The _____ collects logs and sends them to the _____.
A. Log server; Security Gateway
B. Security Gateways; log server
C. Log server; security management server
D. Security management server; Security Gateway
B. Security Gateways; log server
Which of the following is NOT an authentication scheme used for accounts created through SmartConsole?
A. RADIUS
B. SecurID
C. Check Point password
D. Security questions
D. Security questions
Which of the following statements about Site-to-Site VPN Domain-based is NOT true?
A. Route-based- The Security Gateways will have a Virtual Tunnel Interface (VTI) for each VPN Tunnel with a peer VPN Gateway. The Routing Table can have routes to forward traffic to these VTIs. Any traffic routed through a VTI is automatically identified as VPN Traffic and is passed through the VPN Tunnel associated with the VTI.
B. Domain-based- VPN domains are pre-defined for all VPN Gateways.
A VPN domain is a service or user that can send or receive VPN traffic through a VPN Gateway.
C. Domain-based- VPN domains are pre-defined for all VPN Gateways. A VPN domain is a host or network that can send or receive VPN traffic through a VPN Gateway.
D. Domain-based- VPN domains are pre-defined for all VPN Gateways.
When the Security Gateway encounters traffic originating from one VPN Domain with the destination to a VPN Domain of another VPN Gateway, that traffic is identified as VPN traffic and is sent through the VPN Tunnel between the two Gateways.
A. Route-based- The Security Gateways will have a Virtual Tunnel Interface (VTI) for each VPN Tunnel with a peer VPN Gateway. The Routing Table can have routes to forward traffic to these VTIs. Any traffic routed through a VTI is automatically identified as VPN Traffic and is passed through the VPN Tunnel associated with the VTI.
What is the main objective when using Application Control?
A. To see what users are doing.
B. Ensure security and privacy of information.
C. To filter out specific content.
D. To assist the firewall blade with handling traffic.
B. Ensure security and privacy of information.
Which default Gaia user has full read/write access?
A. superuser
B. monitor
C. altuser
D. admin
D. admin
Which icon in the WebUI indicates that read/write access is enabled?
A. Eyeglasses
B. Pencil
C. Padlock
D. Book
B. Pencil
Which SmartConsole tab is used to monitor network and security performance?
A. Logs Monitor
B. Manage Settings
C. Security Policies
D. Gateway Servers
A. Logs Monitor
Check Point Update Service Engine (CPUSE), also known as Deployment Agent [DA], is an advanced and intuitive mechanism for software deployment on Gaia OS. What software packages are supported for deployment?
A. It supports deployments of single HotFixes (HF), and of Major Versions. Blink Packages and HotFix Accumulators (Jumbo) are not supported.
B. It supports deployments of single HotFixes (HF), of HotFix Accumulators (Jumbo), and of Major Versions.
C. It supports deployments of Major Versions and Blink packages only.
D. It supports deployments of single HotFixes (HF), of HotFix Accumulators (Jumbo), but not of Major Versions.
B. It supports deployments of single HotFixes (HF), of HotFix Accumulators (Jumbo), and of Major Versions
In SmartConsole, on which tab are Permissions and Administrators defined?
A. MANAGE & SETTINGS
B. SECURITY POLICIES
C. GATEWAYS & SERVERS
D. LOGS & MONITOR
A. MANAGE & SETTINGS
Which tool allows automatic update of Gaia OS and Check Point products installed on Gaia OS?
A. CPDAS - Check Point Deployment Agent Service
B. CPUSE - Check Point Upgrade Service Engine
C. CPASE - Check Point Automatic Service Engine
D. CPAUE - Check Point Automatic Update Engine
B. CPUSE - Check Point Upgrade Service Engine
In the Check Point three-tiered architecture, which of the following is NOT a function of the Security Management Server?
A. Verify and compile Security Policies.
B. Display policies and logs on the administrator’s workstation.
C. Store firewall logs to hard drive storage.
D. Manage the object database.
B. Display policies and logs on the administrator’s workstation.
True or False: More than one administrator can log into the Security Management Server with SmartConsole with write permission at the same time.
A. True, every administrator works on a different database that is independent of the other administrators
B. False, only one administrator can login with write permission
C. True, every administrator works in a session that is independent of the other administrators
D. False, this feature has to be enabled in the Global Properties
C. True, every administrator works in a session that is independent of the other administrators
What Check Point tool is used to automatically update Check Point products for the Gaia OS?
A. Check Point Update Engine
B. Check Point Upgrade Installation Service
C. Check Point Upgrade Service Engine (CPUSE)
D. Check Point INSPECT Engine
C. Check Point Upgrade Service Engine (CPUSE)