Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam 156-215.80 topic 1 question 26 discussion

Actual exam question from Checkpoint's 156-215.80
Question #: 26
Topic #: 1
[All 156-215.80 Questions]

What are the three authentication methods for SIC?

  • A. Passwords, Users, and standards-based SSL for the creation of secure channels
  • B. Certificates, standards-based SSL for the creation of secure channels, and 3DES or AES128 for encryption
  • C. Packet Filtering, certificates, and 3DES or AES128 for encryption
  • D. Certificates, Passwords, and Tokens
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️
Secure Internal Communication (SIC)
Secure Internal Communication (SIC) lets Check Point platforms and products authenticate with each other. The SIC procedure creates a trusted status between gateways, management servers and other Check Point components. SIC is required to install polices on gateways and to send logs between gateways and management servers.
These security measures make sure of the safety of SIC:
✑ Certificates for authentication
✑ Standards-based SSL for the creation of the secure channel
✑ 3DES for encryption
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_SecMan_WebAdmin/html_frameset.htm?topic=documents/R76/
CP_R76_SecMan_WebAdmin/71950

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Hernan_Mella
1 year, 10 months ago
Babochnik its ok
upvoted 1 times
...
babochnik
1 year, 11 months ago
Selected Answer: B
Check Point platforms and products authenticate each other through one of these Secure Internal Communication (SIC) methods: Certificates. Standards-based TLS for the creation of secure channels. 3DES or AES128 for encryption. Security Gateways R71 and higher use AES128 for SIC. If one of the Security Gateways is below R71, the Security Gateways use 3DES. https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_SecurityManagement_AdminGuide/Topics-SECMG/Secure-Internal-Communication.htm?TocPath=Managing%20Gateways%7CSecure%20Internal%20Communication%20(SIC)%7C_____0
upvoted 1 times
...
NetStef
2 years, 9 months ago
B is correct, CSSA Study Guide p.79
upvoted 2 times
...
theManFromRoom5
2 years, 10 months ago
It's not an authentication method, just added security which protects the integrity of SIC.
upvoted 3 times
...
bardin2177
2 years, 11 months ago
the question wording is a bit odd: I reckon authentication method has nothing to do with SSL or encryption algorithms
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...