You are not logged in.
Check Point Certification Interview Questions And Answers
Check Point Certification Exams guideline for job interview preparation. Explore list of Check Point Certification Exams frequently asked questions(FAQs) asked in number of Check Point Certification Exams interviews. Post your comments as your suggestions, questions and answers on any Check Point Certification Exams Interview Question or answer. Ask Check Point Certification Exams Question, your question will be answered by our fellow friends.
1 Suppose A (n) __________________________ is issued by senior management, and defines anorganizations security goals.A. Records-retention procedureB. Acceptable-use policyC. Organizational security policyD. Security policy mission statementE. Service level agreement?
2 Explain Which of these metrics measure how a biometric device performs, when attempting toauthenticate subjects? (Choose THREE.)A. False Rejection RateB. User Acceptance RateC. Crossover Error RateD. False Acceptance RateE. Enrollment Failure Rate?
3 A(n) _______________ is an abstract machine, which mediates all access subjects have toobjects.A. ACLB. Reference monitorC. State machineD. TCBE. Router?
4 _________ is a smaller, enhanced version of the X.500 protocol. It is used to provide directory-service information. (Choose the BEST answer.)A. Lightweight Directory Access ProtocolB. X.400 Directory Access ProtocolC. Access control listD. Lightweight Host Configuration ProtocolE. Role-based access control?
5 Explain Which types of security solutions should a home user deploy? (Choose TWO.)A. Managed Security GatewayB. Access control lists on a routerC. Personal firewallD. Network intrusion-detection systemE. Anti-virus software?
6 ____________________ is the state of being correct, or the degree of certainty a person orprocess can have, that the data in an information asset is correct.A. ConfidentialityB. IntegrityC. AuthenticityD. PrivacyE. Availability?
7 Maintenance of the Business Continuity Plan (BCP) must be integrated with an organizations_______________ process.A. Change-controlB. Disaster-recoveryC. Inventory-maintenanceD. Discretionary-budgetE. Compensation-review?
8 Embedding symbols in images or common items, such as pictures or quilts, is an example of__________.A. EspionageB. Transposition cipherC. Key exchangeD. ArithmancyE. Steganography?
9 ____________________ educate(s) security administrators and end users about organizationssecurity policies.A. Security-awareness trainingB. Information Security (INFOSEC) briefingsC. Acceptable-use policiesD. Continuing educationE. Nondisclosure agreements?
10 Operating-system fingerprinting uses all of the following, EXCEPT ________, to identify a targetoperating system.A. Sequence VerifierB. Initial sequence numberC. Address spoofingD. Time to LiveE. IP ID field?
11 Explain Which encryption algorithm has the highest bit strength?A. AESB. BlowfishC. DESD. CASTE. Triple DES?
12 Explain Which type of Business Continuity Plan (BCP) test involves shutting down a primary site, bringingan alternate site on-line, and moving all operations to the alternate site?A. ParallelB. Full interruptionC. ChecklistD. Structured walkthroughE. Simulation?
13 A(n) _______________ is an unintended communication path that can be used to violate asystem security policy.A. Covert channelB. Integrity axiomC. Simple rule violationD. Inferred fact?
14 A _______ attack uses multiple systems to launch a coordinated attack.A. Distributed denial-of-serviceB. TeardropC. BirthdayD. FTP BounceE. Salami?
15 Virtual corporations typically use a(n) _______ for maintaining centralized information assets.A. Off-line repositoryB. Floppy diskC. Data warehouseD. CD-ROM burnerE. Colocation?
16 Which of the following is an example of a simple, physical-access control?A. LockB. Access control listC. Background checkD. TokenE. Firewall?
17 Which of the following is NOT an auditing function that should be performed regularly?A. Reviewing IDS alertsB. Reviewing performance logsC. Reviewing IDS logsD. Reviewing audit logsE. Reviewing system logs?
18 _______ can mimic the symptoms of a denial-of-service attack, and the resulting loss inproductivity can be no less devastating to an organization.A. ICMP trafficB. Peak trafficC. Fragmented packetsD. Insufficient bandwidthE. Burst traffic?
19 Explain How do virtual corporations maintain confidentiality?A. EncryptionB. ChecksumC. Data hashesD. Redundant serversE. Security by obscurity?
20 Organizations _______ risk, when they convince another entity to assume the risk for them.A. ElevateB. AssumeC. DenyD. TransferE. Mitigate?
21 Explain What type of document contains information on alternative business locations, IT resources, andpersonnel?A. End-user license agreementB. Nondisclosure agreementC. Acceptable use policyD. Security policyE. Business continuity plan?
22 A(n) _______ is the first step for determining which technical information assets should beprotected.A. Network diagramB. Business Impact AnalysisC. Office floor planD. FirewallE. Intrusion detection system?
23 Explain Which of the following is the BEST method for managing users in an enterprise?A. Enter user data in a spreadsheet.B. Implement centralized access control.C. Deploy Kerberos.D. Place them in a centralized Lightweight Directory Access Protocol.E. Use a Domain Name System.
24 Explain Which of the following should be included in an enterprise Business Continuity Plan (BCP)?(Choose THREE.)A. Accidental or intentional data deletionB. Severe weather disastersC. Employee terminationsD. Employee administrative leaveE. Minor power outages
25 Explain Which principle of secure design states that a security mechanisms methods must be testable?A. Separation of privilegeB. Least common mechanismC. Complete mediationD. Open designE. Economy of mechanism
26 _______ intrusion-detection systems learn the behavior of a machine or network, and create abaseline.A. Behavioral analysisB. Statistical anomalyC. NetworkD. Pattern matchingE. Host
27 (n) ________________ is a one-way mathematical function that maps variable values intosmaller values of a fixed length.A. Symmetric keyB. AlgorithmC. Back doorD. Hash functionE. Integrity
28 Explain Which of the following tests provides testing teams some information about hosts or networks?A. Partial-knowledge testB. Full-knowledge testC. Zero-knowledge test
29 A new U.S. Federal Information Processing Standard specifies a cryptographic algorithm. Thisalgorithm is used by U.S. government organizations to protect sensitive, but unclassified,information. What is the name of this Standard?A. Triple DESB. BlowfishC. AESD. CASTE. RSA
30 Explain Which of the following are enterprise administrative controls? (Choose TWO.)A. Network access controlB. Facility access controlC. Password authenticationD. Background checksE. Employee handbooks
31 _______ is a method of tricking users into revealing passwords, or other sensitive information.A. Dumpster divingB. Means testingC. Social engineeringD. RiskE. Exposure
32 Explain Who should have physical access to network-connectivity devices and corporate servers?A. Customers and clientsB. Accounting, information-technology, and auditing staffC. Managers and C-level executivesD. Only appropriate information-technology personnel
33 A(n) ______________________________ is a quantitative review of risks, to determine how anorganization will continue to function, in the event a risk is realized.A. Monitored risk processB. Disaster-recovery planC. Business impact analysisD. Full interruption testE. Information security audit
34 Explain Which of the following can be stored on a workstation? (Choose TWO.)A. Payroll informationB. Data objects used by many employeesC. DatabasesD. Interoffice memoE. Customer correspondence
35 Explain Which type of Business Continuity Plan (BCP) test involves practicing aspects of the BCP,without actually interrupting operations or bringing an alternate site on-line?A. Structured walkthroughB. ChecklistC. SimulationD. Full interruptionE. Parallel
- Ads By Google