ExamGecko
Question list
Search
Search

Question 340 - 156-315.81 discussion

Report
Export

How is communication between different Check Point components secured in R81? As with all questions, select the BEST answer.

A.
By using IPSEC
Answers
A.
By using IPSEC
B.
By using SIC
Answers
B.
By using SIC
C.
By using ICA
Answers
C.
By using ICA
D.
By using 3DES
Answers
D.
By using 3DES
Suggested answer: B

Explanation:

Communication between different Check Point components is secured by using SIC, which stands for secure internal communication. SIC is a certificate-based channel that uses standards-based TLS 1.2 for creating secure connections and AES128 for encryption. SIC ensures that only authorized components can communicate with each other and that the communication is protected from eavesdropping and tampering. SIC is established by using a one-time password (OTP) that is generated when a Check Point component is created or installed. The OTP is used to initialize the trust relationship between the component and the Security Management Server, which acts as an internal certificate authority (ICA) that issues and revokes certificates for the components.

asked 16/09/2024
Maria Lockhart
27 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first