Checkpoint 156-215.80 - Check Point Certified Security Administrator (CCSA R80) Exam
Page: 2 / 108
Total 536 questions
Question #6 (Topic: Single Topic)
Which of the following Automatically Generated Rules NAT rules have the lowest implementation priority?
A. Machine Hide NAT
B. Address Range Hide NAT
C. Network Hide NAT
D. Machine Static NAT
Answer: C
Question #7 (Topic: Single Topic)
VPN gateways authenticate using ___________ and ___________ .
A. Passwords; tokens
B. Certificates; pre-shared secrets
C. Certificates; passwords
D. Tokens; pre-shared secrets
Answer: B
Question #8 (Topic: Single Topic)
In R80 spoofing is defined as a method of:
A. Disguising an illegal IP address behind an authorized IP address through Port Address Translation.
B. Hiding your firewall from unauthorized users.
C. Detecting people using false or wrong authentication logins
D. Making packets appear as if they come from an authorized IP address.
Answer: D
Question #9 (Topic: Single Topic)
The __________ is used to obtain identification and security information about network users.
A. User Directory
B. User server
C. UserCheck
D. User index
Answer: A
Question #10 (Topic: Single Topic)
Which Check Point Application Control feature enables application scanning and detection?
A. Application Dictionary
B. AppWiki
C. Application Library
D. CPApp
Answer: B