What are the three authentication methods for SIC?
A . Passwords, Users, and standards-based SSL for the creation of security channels
B . Certificates, standards-based SSL for the creation of secure channels, and 3DES or AES128 for encryption
C . Packet Filtering, certificates, and 3DES or AES128 for encryption
D . Certificates, Passwords, and Tokens
Answer: B
Explanation:
Secure Internal Communication (SIC)
Secure Internal Communication (SIC) lets Check Point platforms and products authenticate with each other. The SIC procedure creates a trusted status between gateways, management servers and other Check Point components. SIC is required to install polices on gateways and to send logs between gateways and management servers.
These security measures make sure of the safety of SIC:
Certificates for authentication Standards-based SSL for the creation of the secure channel 3DES for encryption
Latest 156-215.80 Dumps Valid Version with 528 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund