Check Point Certification Exams Question:
Download Questions PDF

Explain Who should have physical access to network-connectivity devices and corporate servers?
A. Customers and clients
B. Accounting, information-technology, and auditing staff
C. Managers and C-level executives
D. Only appropriate information-technology personnel

Answer:

D. Only appropriate information-technology personnel

Download Check Point Certification Interview Questions And Answers PDF

Previous QuestionNext Question
_______ is a method of tricking users into revealing passwords, or other sensitive information.
A. Dumpster diving
B. Means testing
C. Social engineering
D. Risk
E. Exposure
A(n) ______________________________ is a quantitative review of risks, to determine how an
organization will continue to function, in the event a risk is realized.
A. Monitored risk process
B. Disaster-recovery plan
C. Business impact analysis
D. Full interruption test
E. Information security audit