Check Point Certified Security Administrator (CCSA) R80.40 Quiz Questions and Answers

VPN gateways must authenticate to each other prior to exchanging information. What are the two types of credentials used for authentication?

Answer :
  • Certificates and pre-shared secret

NAT can NOT be configured on which of the following objects?

Answer :
  • HTTP Logical Server

What are the three essential components of the Check Point Security Management Architecture?

Answer :
  • SmartConsole, Security Management Server, Security Gateway

To optimize Rule Base efficiency, the most hit rules should be where?

Answer :
  • Towards the top of the Rule Base.

Which remote Access Solution is clientless?

Answer :
  • Mobile Access Portal

An LDAP server holds one or more ______________.

Answer :
  • Account Units

Which Threat Prevention Software Blade provides comprehensive against malicious and unwanted network traffic, focusing on application and server vulnerabilities?

Answer :
  • IPS

Browser-based Authentication sends users to a web page to acquire identities using ________.

Answer :
  • Captive Portal and Transparent Kerberos Authentication

Which of the following are types of VPN communities?

Answer :
  • Meshed, star, and combination

The R80 utility fw monitor is used to troubleshoot _____________.

Answer :
  • Traffic issues