Suggested Answer:B🗳️
Secure Internal Communication (SIC) Secure Internal Communication (SIC) lets Check Point platforms and products authenticate with each other. The SIC procedure creates a trusted status between gateways, management servers and other Check Point components. SIC is required to install polices on gateways and to send logs between gateways and management servers. These security measures make sure of the safety of SIC: ✑ Certificates for authentication ✑ Standards-based SSL for the creation of the secure channel ✑ 3DES for encryption Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_SecMan_WebAdmin/html_frameset.htm?topic=documents/R76/ CP_R76_SecMan_WebAdmin/71950
Check Point platforms and products authenticate each other through one of these Secure Internal Communication (SIC) methods:
Certificates.
Standards-based TLS for the creation of secure channels.
3DES or AES128 for encryption.
Security Gateways R71 and higher use AES128 for SIC. If one of the Security Gateways is below R71, the Security Gateways use 3DES.
https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_SecurityManagement_AdminGuide/Topics-SECMG/Secure-Internal-Communication.htm?TocPath=Managing%20Gateways%7CSecure%20Internal%20Communication%20(SIC)%7C_____0
the question wording is a bit odd: I reckon authentication method has nothing to do with SSL or encryption algorithms
upvoted 4 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Hernan_Mella
2 days, 2 hours agobabochnik
1 month agoNetStef
10 months, 3 weeks agotheManFromRoom5
11 months, 3 weeks agobardin2177
1 year ago