Prev Question
Next Question

What are the three authentication methods for SIC?

A.
Passwords, Users, and standards-based SSL for the creation of security channels

B.
Certificates, standards-based SSL for the creation of secure channels, and 3DES or AES128 for encryption

C.
Packet Filtering, certificates, and 3DES or AES128 for encryption

D.
Certificates, Passwords, and Tokens

Explanation:
Secure Internal Communication (SIC)
Secure Internal Communication (SIC) lets Check Point platforms and products authenticate with each other.
The SIC procedure creates a trusted status between gateways, management servers and other Check Point
components. SIC is required to install polices on gateways and to send logs between gateways and
management servers.
These security measures make sure of the safety of SIC:
Certificates for authentication
Standards-based SSL for the creation of the secure channel
3DES for encryption
https://sc1.checkpoint.com/documents/R76/CP_R76_SecMan_WebAdmin/html_frameset.htm?
topic=documents/R76/CP_R76_SecMan_WebAdmin/71950

Prev Question
Next Question

Leave a Reply

Your email address will not be published. Required fields are marked *