Checkpoint Interview Questions With Answer Part 4
Checkpoint Interview Questions With Answer Part 4
Checkpoint Interview Questions With Answer Part 4
You can view the results of the checkpoints in the Test Result Window.
Note: If you want to retrieve the return value of a checkpoint (a boolean value that indicates whether
the checkpoint passed or failed) you must add parentheses around the checkpoint argument in the
statement in the Expert View.
Standard Checkpoints checks the property value of an object in your application or web page.
Q. A(n) ______ is an abstract machine, which mediates all access subjects have
to objects.
Reference monitor
Q. What’s the Image Checkpoint?
Image Checkpoint check the value of an image in your application or web page.
Bitmap Checkpoint checks the bitmap images in your web page or application.
Text Checkpoint checks that a test string is displayed in the appropriate place in your application or
on web page.
Q. Which environment are supported by Test Checkpoint?
Stealth Rule Protect Checkpoint firewall from direct access any traffic. Its rule should be place on the
top of Security rule base. In this rule administrator denied all traffic to access checkpoint firewall.
Cleanup rule place at last of the security rule base, Its used to drop all traffic which not match with
above rule and Logged. Cleanup rule mainly created for log purpose. In this rule administrator denied
all the traffic and enable log.
Its a rule in ruse base which is manually created by network security administrator that called Explicit
rule.
Smart Console.
Security Management.
Security Gateway.
Q. What is the Packet Flow of Checkpoint firewall.
SAM Database.
Address Spoofing.
Session Lookup.
Policy Lookup.
Destination NAT.
Route Lookup.
Source NAT.
Layer 7 Inspection.
VPN.
Routing.
Q. Explain Which type of Business Continuity Plan (BCP) test involves shutting
down a primary site, bringing an alternate site on-line, and moving all operations
to the alternate site?
Full interruption.
AES
Q. Explain Which type of Business Continuity Plan (BCP) test involves shutting
down a primary site, bringing an alternate site on-line, and moving all operations
to the alternate site?
Full interruption
Q. A(n) _____ is an unintended communication path that can be used to violate
a system security policy.
Covert channel
Colocation
Lock
Distributed denial-of-service
Q. _______ can mimic the symptoms of a denial-of-service attack, and the resulting
loss in productivity can be no less devastating to an organization.
Insufficient bandwidth
Encryption
Q. Explain What type of document contains information on alternative business
locations, IT resources, and personnel?
Q. A _______ is the first step for determining which technical information assets
should be protected.
Network diagram
Q. Explain Which of the following is the BEST method for managing users in an
enterprise?
Q. Explain Which type of Business Continuity Plan (BCP) test involves practicing
aspects of the BCP, without actually interrupting operations or bringing an
alternate site on-line?
Simulation