CCSA Checkpoint Exam Questions with 100% Correct Answers
0 view 0 purchase
Course
CCSA Checkpoint
Institution
CCSA Checkpoint
CCSA Checkpoint Exam Questions with 100% Correct Answers
The Online Activation method is available for Check Point manufactured appliances. How does the administrator use the Online Activation method? - Answer- Using the Gaia First Time Configuration Wizard, the appliance connects to the Check ...
CCSA Checkpoint Exam Questions
with 100% Correct Answers
The Online Activation method is available for Check Point manufactured appliances.
How does the administrator use the Online Activation method? - Answer- Using the
Gaia First Time Configuration Wizard, the appliance connects to the Check Point User
Center and downloads all necessary licenses and contracts.
In which scenario will an administrator need to manually define Proxy ARP? - Answer-
When they configure a "Manual Static NAT" which translates to an IP address that does
not belong to one of the firewall's interfaces.
Which Threat Prevention profile uses sanitization technology? - Answer- perimeter
Which two Identity Awareness daemons are used to support identity sharing? - Answer-
SmartEvent
Which product correlates logs and detects security threats, providing a centralized
display of potential attack patterns from all network devices? - Answer- Delete the data
to ensure an analysis of the data is done each time.
When a SAM rule is required on Security Gateway to quickly block suspicious
connections which are not restricted by the Security Policy, what actions does the
administrator need to take? - Answer- SmartView Monitor should be opened and then
the SAM rule/s can be applied immediately. Installing policy is not required.
Fill in the blank: An Endpoint identity agent uses a _____ for user authentication. -
Answer- Username/password or Kerberos Ticket
Fill in the blanks: The _______ collects logs and sends them to the _______. - Answer-
Security Gateways; log server
Which of the following is NOT an advantage to using multiple LDAP servers? - Answer-
Information on a user is hidden, yet distributed across several servers.
Fill in the blanks: The Application Layer Firewalls inspect traffic through the ______
layer(s) of the TCP/IP model and up to and including the ______ layer. - Answer-
Lower; Application
, When an Admin logs into SmartConsole and sees a lock icon on a gateway object and
cannot edit that object, what does that indicate? - Answer- Incorrect routing to reach the
gateway.
DLP and Geo Policy are examples of what type of Policy? - Answer- Shared Policies
Fill in the blanks: In _____ NAT, Only the ________ is translated. - Answer- Hide;
source
When enabling tracking on a rule, what is the default option? - Answer- log
Gaia includes Check Point Upgrade Service Engine (CPUSE), which can directly
receive updates for what components? - Answer- Licensed Check Point products for the
Gala operating system and the Gaia operating system itself.
Name the file that is an electronically signed file used by Check Point to translate the
features in the license into a code? - Answer- Contract file (.xml)
Fill in the blank: When LDAP is integrated with Check Point Security Management, it is
then referred to as _______. - Answer- User Directory
Can you use the same layer in multiple policies or rulebases? - Answer- Yes - a layer
can be shared with multiple policies and rules.
Tom has connected to the Management Server remotely using SmartConsole and is in
the process of making some Rule Base changes, when he suddenly loses connectivity.
Connectivity is restored shortly afterward. What will happen to the changes already
made? - Answer- Tom's changes will have been stored on the Management when he
reconnects and he will not lose any of his work.
Security Gateway software blades must be attached to what? - Answer- Security
Gateway
Which tool allows you to monitor the top bandwidth on smart console? - Answer-
SmartView Monitor
A security zone is a group of one or more network interfaces from different centrally
managed gateways. What is considered part of the zone? - Answer- The zone is based
on the network topology and determined according to where the interface leads to.
When comparing Stateful Inspection and Packet Filtering, what is a benefit that Stateful
Inspection offers over Packer Filtering? - Answer- Only one rule is required for each
connection.
Which type of Endpoint Identity Agent includes packet tagging and computer
authentication? - Answer- full
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.49. You're not tied to anything after your purchase.