What are the three authentication methods for SIC?

What are the three authentication methods for SIC?
A . Passwords, Users, and standards-based SSL for the creation of secure channels
B . Certificates, standards-based SSL for the creation of secure channels, and 3DES or AES128 for encryption
C . Packet Filtering, certificates, and 3DES or AES128 for encryption
D . Certificates, Passwords, and Tokens

Answer: B

Explanation:

Secure Internal Communication (SIC)

Secure Internal Communication (SIC) lets Check Point platforms and products authenticate with each other. The SIC procedure creates a trusted status between gateways, management servers and other Check Point components. SIC is required to install polices on gateways and to send logs between gateways and management servers.

These security measures make sure of the safety of SIC:

– Certificates for authentication

– Standards-based SSL for the creation of the secure channel

– 3DES for encryption

Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_SecMan_WebAdmin/html_frameset.htm?topic=documents/R76/CP_R76_SecMan_WebAdmin/71950

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments