Check Point Certified Security Administrator (CCSA) R80.40 Quiz Questions and Answers

What are the three essential components of the Check Point Security Management Architecture?

Answer :
  • SmartConsole, Security Management Server, Security Gateway

To optimize Rule Base efficiency, the most hit rules should be where?

Answer :
  • Towards the top of the Rule Base.

VPN gateways must authenticate to each other prior to exchanging information. What are the two types of credentials used for authentication?

Answer :
  • Certificates and pre-shared secret

NAT can NOT be configured on which of the following objects?

Answer :
  • HTTP Logical Server

Which remote Access Solution is clientless?

Answer :
  • Mobile Access Portal

An LDAP server holds one or more ______________.

Answer :
  • Account Units

Which Threat Prevention Software Blade provides comprehensive against malicious and unwanted network traffic, focusing on application and server vulnerabilities?

Answer :
  • IPS

Browser-based Authentication sends users to a web page to acquire identities using ________.

Answer :
  • Captive Portal and Transparent Kerberos Authentication

Which of the following are types of VPN communities?

Answer :
  • Meshed, star, and combination

Which of the following is an identity acquisition method that allows a Security Gateway to identify Active Directory users and computers?

Answer :
  • Active Directory Query