D vpn domain Answer: a question 2



Download 1.25 Mb.
Page10/17
Date21.02.2023
Size1.25 Mb.
#60712
1   ...   6   7   8   9   10   11   12   13   ...   17
CCSA 1-100
「月租好易 Pay 」電子支付系統
Answer: C

QUESTION 52
Fill in the blank: The tool generates a R80 Security Gateway configuration report.
A. infoCP
B. infoview
C. cpinfo
D. fw cpinfo
Answer: C

QUESTION 53
Which of the following commands can be used to remove site-to-site IPSEC Security
Associations (SA)?
A. vpn tu
B. vpn ipsec remove -l
C. vpn debug ipsec
D. fw ipsec tu
Answer: A

QUESTION 54
Which of the following is NOT an authentication scheme used for accounts created through
SmartConsole?
A. Security questions
B. Check Point password
C. SecurID
D. RADIUS
Answer: A

QUESTION 55
Which pre-defined Permission Profile should be assigned to an administrator that requires full
access to audit all configurations without modifying them?
A. Auditor
B. Read Only All
C. Super User
D. Full Access
Answer: B

QUESTION 56
Packages and licenses are loaded from all of theses sources EXCEPT
A. Download Center Web site
B. UserUpdate
C. User Center
D. Check Point DVD
Answer: B

QUESTION 57
Which of the following technologies extracts detailed information from packets and stores that
information in state tables?
A. INSPECT Engine
B. Stateful Inspection
C. Packet Filtering
D. Application Layer Firewall
Answer: B

QUESTION 58
On the following graphic, you will find layers of policies.
What is a precedence of traffic inspection for the defined polices?
A. A packet arrives at the gateway, it is checked against the rules in the networks policy layer and
then if implicit Drop Rule drops the packet, it comes next to IPS layer and then after accepting the
packet it passes to Threat Prevention layer.
B. A packet arrives at the gateway, it is checked against the rules in the networks policy layer and
then if there is any rule which accepts the packet, it comes next to IPS layer and then after
accepting the packet it passes to Threat Prevention layer
C. A packet arrives at the gateway, it is checked against the rules in the networks policy layer and
then if there is any rule which accepts the packet, it comes next to Threat Prevention layer and
then after accepting the packet it passes to IPS layer.
D. A packet arrives at the gateway, it is checked against the rules in IPS policy layer and then it
comes next to the Network policy layer and then after accepting the packet it passes to Threat
Prevention layer.

Download 1.25 Mb.

Share with your friends:
1   ...   6   7   8   9   10   11   12   13   ...   17




The database is protected by copyright ©ininet.org 2024
send message

    Main page