exam questions

Exam 156-215.80 All Questions

View all questions & answers for the 156-215.80 exam

Exam 156-215.80 topic 1 question 26 discussion

Actual exam question from Checkpoint's 156-215.80
Question #: 26
Topic #: 1
[All 156-215.80 Questions]

What are the three authentication methods for SIC?

  • A. Passwords, Users, and standards-based SSL for the creation of secure channels
  • B. Certificates, standards-based SSL for the creation of secure channels, and 3DES or AES128 for encryption
  • C. Packet Filtering, certificates, and 3DES or AES128 for encryption
  • D. Certificates, Passwords, and Tokens
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️
Secure Internal Communication (SIC)
Secure Internal Communication (SIC) lets Check Point platforms and products authenticate with each other. The SIC procedure creates a trusted status between gateways, management servers and other Check Point components. SIC is required to install polices on gateways and to send logs between gateways and management servers.
These security measures make sure of the safety of SIC:
✑ Certificates for authentication
✑ Standards-based SSL for the creation of the secure channel
✑ 3DES for encryption
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_SecMan_WebAdmin/html_frameset.htm?topic=documents/R76/
CP_R76_SecMan_WebAdmin/71950

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Hernan_Mella
2 days, 2 hours ago
Babochnik its ok
upvoted 1 times
...
babochnik
1 month ago
Selected Answer: B
Check Point platforms and products authenticate each other through one of these Secure Internal Communication (SIC) methods: Certificates. Standards-based TLS for the creation of secure channels. 3DES or AES128 for encryption. Security Gateways R71 and higher use AES128 for SIC. If one of the Security Gateways is below R71, the Security Gateways use 3DES. https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_SecurityManagement_AdminGuide/Topics-SECMG/Secure-Internal-Communication.htm?TocPath=Managing%20Gateways%7CSecure%20Internal%20Communication%20(SIC)%7C_____0
upvoted 1 times
...
NetStef
10 months, 3 weeks ago
B is correct, CSSA Study Guide p.79
upvoted 2 times
...
theManFromRoom5
11 months, 3 weeks ago
It's not an authentication method, just added security which protects the integrity of SIC.
upvoted 3 times
...
bardin2177
1 year ago
the question wording is a bit odd: I reckon authentication method has nothing to do with SSL or encryption algorithms
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago