In the Check Point Security Management Architecture, which component(s) can store logs?
Answer(s): B
The Security Management Server and the Security Gateway are the components that can store logs in the Check Point Security Management Architecture. The Security Management Server stores logs in a database and can also forward them to external log servers. The Security Gateway can store logs locally in a buffer or a local log file, and can also send them to the Security Management Server or a log server.
Check Point Security Management Administration Guide R81, p. 11-12
Fill in the blank: In order to install a license, it must first be added to the ____________.
Answer(s): D
In order to install a license, it must first be added to the License and Contract repository. The License and Contract repository is a centralized database that stores all the licenses and contracts for Check Point products. It allows you to manage, activate, and attach licenses to your Check Point products.
Check Point Security Management Administration Guide R81, p. 19-20
When logging in for the first time to a Security management Server through SmartConsole, a fingerprint is saved to the:
When logging in for the first time to a Security Management Server through SmartConsole, a fingerprint is saved to the SmartConsole cache and is available for future Security Management Server authentications. The fingerprint is a unique identifier of the Security Management Server that is used to verify its identity and prevent man-in-the-middle attacks. The SmartConsole cache is a local folder on the client machine that stores temporary files and settings.
Check Point Security Management Administration Guide R81, p. 25-26
Fill in the blank: By default, the SIC certificates issued by R80 Management Server are based on the ____________ algorithm.
Answer(s): A
By default, the SIC certificates issued by R80 Management Server are based on the SHA-256 algorithm1. SHA-256 is a secure hash algorithm that produces a 256-bit digest. SHA-200, MD5, and SHA-128 are not valid algorithms for SIC certificates.
SHA-1 and SHA-256 certificates in Check Point Internal CA (ICA)
Post your Comments and Discuss Checkpoint 156-215.81 exam with other Community members:
Pooja commented on September 08, 2024 Nice info ok I will do the same Anonymous upvote
IPR commented on October 05, 2023 q:124 is wrong - the correct answer is b but the syntax is: ip-address Anonymous upvote
IPR commented on October 05, 2023 Q:124 is wrong - the correct answer is B but the syntax is: ip-address Anonymous upvote
Our website is free, but we have to fight against bots and content theft. We're sorry for the inconvenience caused by these security measures. You can access the rest of the 156-215.81 content, but please register or login to continue.