Q1. In the Check Point three-tiered architecture, which of the following is NOT a function of the Security Management Server?
A.Display policies and logs on the administrator's workstation.
B. Processing and sending alerts such as SNMP traps and email notifications.
C. Verify and compile Security Policies.
D. Store firewall logs to hard drive storage.
Correct Answer: A
Q2. Fill in the blank: The_____is used to obtain identification and security information about network users.
A.User index
B. UserCheck
C. User Directory
D. User server
Correct Answer: C
Q3. Which encryption algorithm is the least secured?
A.3DES
B. AES-128
C. DES
D. AES-256
Correct Answer: C
Q4. If an administrator wants to restrict access to a network resource only allowing certain users to access it, and only when they are on a specific network what is the best way to accomplish this?
A.Create an inline layer where the destination is the target network resource Define sub-rules allowing only specific sources to access the target resource
B. Use a 'New Legacy User at Location', specifying the LDAP user group that the users belong to, at the desired location
C. Create a rule allowing only specific source IP addresses access to the target network resource.
D. Create an Access Role object, with specific users or user groups specified, and specific networks defined Use this access role as the 'Source' of an Access Control rule
Correct Answer: D
$ 39
Reviews
There are no reviews yet.