Check Point Certification Exams Interview Preparation Guide Download PDF Add New Question
Check Point Certification Exams guideline for job interview preparation. Explore list of Check Point Certification Exams frequently asked questions(FAQs) asked in number of Check Point Certification Exams interviews. Post your comments as your suggestions, questions and answers on any Check Point Certification Exams Interview Question or answer. Ask Check Point Certification Exams Question, your question will be answered by our fellow friends.
35 Check Point Certification Questions and Answers:
1 :: Suppose A (n) __________________________ is issued by senior management, and defines an
organizations security goals.
A. Records-retention procedure
B. Acceptable-use policy
C. Organizational security policy
D. Security policy mission statement
E. Service level agreement?
D. Security policy mission statement
Post Your Answer
2 :: Explain Which of these metrics measure how a biometric device performs, when attempting to
authenticate subjects? (Choose THREE.)
A. False Rejection Rate
B. User Acceptance Rate
C. Crossover Error Rate
D. False Acceptance Rate
E. Enrollment Failure Rate?
A. False Rejection Rate
C. Crossover Error Rate
D. False Acceptance Rate
C. Crossover Error Rate
D. False Acceptance Rate
Post Your Answer
3 :: A(n) _______________ is an abstract machine, which mediates all access subjects have to
objects.
A. ACL
B. Reference monitor
C. State machine
D. TCB
E. Router?
B. Reference monitor
Post Your Answer
4 :: _________ is a smaller, enhanced version of the X.500 protocol. It is used to provide directory-
service information. (Choose the BEST answer.)
A. Lightweight Directory Access Protocol
B. X.400 Directory Access Protocol
C. Access control list
D. Lightweight Host Configuration Protocol
E. Role-based access control?
A. Lightweight Directory Access Protocol
Post Your Answer
5 :: Explain Which types of security solutions should a home user deploy? (Choose TWO.)
A. Managed Security Gateway
B. Access control lists on a router
C. Personal firewall
D. Network intrusion-detection system
E. Anti-virus software?
C. Personal firewall
E. Anti-virus software
E. Anti-virus software
Post Your Answer
6 :: ____________________ is the state of being correct, or the degree of certainty a person or
process can have, that the data in an information asset is correct.
A. Confidentiality
B. Integrity
C. Authenticity
D. Privacy
E. Availability?
B. Integrity
Post Your Answer
7 :: Maintenance of the Business Continuity Plan (BCP) must be integrated with an organizations
_______________ process.
A. Change-control
B. Disaster-recovery
C. Inventory-maintenance
D. Discretionary-budget
E. Compensation-review?
A. Change-control
Post Your Answer
8 :: Embedding symbols in images or common items, such as pictures or quilts, is an example of
__________.
A. Espionage
B. Transposition cipher
C. Key exchange
D. Arithmancy
E. Steganography?
E. Steganography
Post Your Answer
9 :: ____________________ educate(s) security administrators and end users about organizations
security policies.
A. Security-awareness training
B. Information Security (INFOSEC) briefings
C. Acceptable-use policies
D. Continuing education
E. Nondisclosure agreements?
A. Security-awareness training
Post Your Answer