Check Point Certified Security Administrator R81.20 Questions and Answers
Question 97
When enabling tracking on a rule, what is the default option?
Options:
A.
Accounting Log
B.
Extended Log
C.
Log
D.
Detailed Log
Answer:
C
Explanation:
Explanation:
When enabling tracking on a rule, the default option is Log. This option generates a log entry for each connection that matches the rule. The log entry contains information such as the source, destination, service, action, and time of the connection.References: [Logging and Monitoring R81], [Logging and Monitoring]
Question 98
URL Filtering cannot be used to:
Options:
A.
Control Bandwidth issues
B.
Control Data Security
C.
Improve organizational security
D.
Decrease legal liability
Answer:
A
Explanation:
Explanation:
URL Filtering is a blade that enables administrators to control access to millions of websites by category, users, groups, and machines. URL Filtering can be used to improve organizational security, decrease legal liability, and control data security by preventing users from accessing malicious or inappropriate websites. However, URL Filtering cannot be used to control bandwidth issues, such as limiting the amount of traffic or prioritizing certain applications over others3. For that purpose, other blades such as QoS (Quality of Service) or SecureXL are more suitable. References: Check Point R81 URL Filtering Administration Guide
Question 99
Which of the following is considered to be the more secure and preferred VPN authentication method?
Options:
A.
Password
B.
Certificate
C.
MD5
D.
Pre-shared secret
Answer:
B
Explanation:
Explanation:
References: Certificate-based authentication is considered to be the more secure and preferred VPN authentication method. It uses digital certificates to verify the identity of the VPN client and server, and provides stronger encryption and mutual authentication. Password-based authentication methods are less secure and more vulnerable to brute-force attacks, phishing, and keylogging. MD5 is a hashing algorithm, not an authentication method. Pre-shared secret is a symmetric key that is shared between the VPN peers, but it can be compromised if it is not changed frequently or stored securely12 References: VPN authentication options, Windows VPN technical guide
Question 100
What is the purpose of the Stealth Rule?
Options:
A.
To prevent users from directly connecting to a Security Gateway.
B.
To reduce the number of rules in the database.
C.
To reduce the amount of logs for performance issues.
D.
To hide the gateway from the Internet.
Answer:
A
Explanation:
Explanation:
The Stealth Rule is used to prevent users from directly connecting to a Security Gateway. It is usually placed at the top of the rule base, before any other rule that allows traffic to the Security Gateway1, p. 32. References: Check Point CCSA - R81: Practice Test & Explanation