Você está na página 1de 4

Blog

Blog (https://mindmajix.com/blog) / CheckPoint (https://mindmajix.com/checkpoint/) / CheckPoint


Interview Questions

CheckPoint Interview Questions


Q. Where you can view the results of the checkpoint?
You can view the results of the checkpoints in the Test Result Window.
Note: If you want to retrieve the return value of a checkpoint (a boolean value that indicates
whether the checkpoint passed or failed) you must add parentheses around the checkpoint
argument in the statement in the Expert View.

Q. Whats the Standard Checkpoint?


Standard Checkpoints checks the property value of an object in your application or web page.

Q. Which environment are supported by Standard Checkpoint?


Standard Checkpoint are supported for all add-in environments.

Q. Explain how a biometric device performs in measuring metrics, when attempting to


authenticate subjects?
1. False Rejection Rate
2. Crossover Error Rate
3. False Acceptance Rate.

Advance your skill set and knowledge for either professional development or CheckPoint
Certi cation (https://mindmajix.com/checkpoint-training) with online training at Mindmajix.
Start Learning!

Q. A(n) ______ is an abstract machine, which mediates all access subjects have to objects.
Reference monitor
Q. Whats the Image Checkpoint?
Image Checkpoint check the value of an image in your application or web page.

Q. Which environments are supported by Image Checkpoint?


Image Checkpoint are supported only Web environment.

Q. Whats the Bitmap Checkpoint?


Bitmap Checkpoint checks the bitmap images in your web page or application.

Q. Which environment are supported by Bitmap Checkpoints?


Bitmap checkpoints are supported all add-in environment.

Q. Whats the Table Checkpoints?


Table Checkpoint checks the information with in a table.

Q. Which environments are supported by Table Checkpoint?


Table Checkpoints are supported only ActiveX environment.

Q. Whats the Text Checkpoint?


Text Checkpoint checks that a test string is displayed in the appropriate place in your application or
on web page.

Q. Which environment are supported by Test Checkpoint?


Text Checkpoint are supported all add-in environments

Q. What is Stealth Rule in checkpoint rewall.


Stealth Rule Protect Checkpoint rewall from direct access any traf c. Its rule should be place on
the top of Security rule base. In this rule administrator denied all traf c to access checkpoint
rewall.

Q. What is Cleanup rule In Checkpoint Firewall.


Cleanup rule place at last of the security rule base, Its used to drop all traf c which not match with
above rule and Logged. Cleanup rule mainly created for log purpose. In this rule administrator
denied all the traf c and enable log.

Q. What is Explicit rule In Checkpoint Firewall.


Its a rule in ruse base which is manually created by network security administrator that called
Explicit rule.

Q. What is 3 trier architecture component of Checkpoint Firewall.


a) Smart Console.
b) Security Management.
c) Security Gateway.

Q. What is the Packet Flow of Checkpoint rewall.


1. SAM Database.
2. Address Spoo ng.
3. Session Lookup.
4. Policy Lookup.
5. Destination NAT.
6. Route Lookup.
7. Source NAT.
8. Layer 7 Inspection.
9. VPN.
10. Routing.

Q. Explain Which type of Business Continuity Plan (BCP) test involves shutting down a primary
site, bringing an alternate site on-line, and moving all operations to the alternate site?
Full interruption.

Q. Explain Which encryption algorithm has the highest bit strength?


AES

Q. Explain Which type of Business Continuity Plan (BCP) test involves shutting down a primary
site, bringing an alternate site on-line, and moving all operations to the alternate site?
Full interruption

Q. A(n) _____ is an unintended communication path that can be used to violate a system security
policy.
Covert channel

Q. Virtual corporations typically use a(n) _______ for maintaining centralized information assets.
Colocation

Q. Give an example for simple, physical-access control?


Lock

Q. A _______ attack uses multiple systems to launch a coordinated attack.


Distributed denial-of-service

Q. Which of the following is NOT an auditing function that should be performed regularly?
Reviewing performance logs
Q. _______ can mimic the symptoms of a denial-of-service attack, and the resulting loss in
productivity can be no less devastating to an organization.
Insuf cient bandwidth

Q. Explain How do virtual corporations maintain con dentiality?


Encryption

Q. Explain What type of document contains information on alternative business locations, IT


resources, and personnel?
Business continuity plan

Q. A _______ is the rst step for determining which technical information assets should be
protected.
Network diagram

Q. Explain Which of the following is the BEST method for managing users in an enterprise?
Place them in a centralized Lightweight Directory Access Protocol.

Q. What are enterprise Business Continuity Plan (BCP)?


Accidental or intentional data deletion
Severe weather disasters
Minor power outages

Check Out CheckPoint Tutorials (https://mindmajix.com/checkpoint)

Q. Explain Which type of Business Continuity Plan (BCP) test involves practicing aspects of the
BCP, without actually interrupting operations or bringing an alternate site on-line?
Simulation

Previous (https://mindmajix.com/ccnp- Next (https://mindmajix.com/chef-devops-


interview-questions) interview-questions)

Social Share


(https://www.facebook.com/sharer/sharer.php?
(https://twitter.com/home?
(https://plus.google.com/share?
(https://www.linkedin.com/shareArticle?
u=https://mindmajix.com/checkpoint-
status=https://mindmajix.com/checkpoint-
url=https://mindmajix.com/checkpoint-
mini=true&url=https://mindmajix.com/checkpoint-
interview-interview-interview-interview-
questions)questions)questions)questions&title=https://mindmajix.com/checkpoint-
interview-
questions&summary=&source=)

RELATED COURSES

Você também pode gostar