Sei sulla pagina 1di 10

  

Blog
Blog (https://mindmajix.com/blog) / CheckPoint (https://mindmajix.com/checkpoint/) / CheckPoint Interview Questions

CheckPoint Interview Questions


(5.0)

 Bookmark  Email  3836 2

If you're looking for CheckPoint Interview Questions for Experienced or Freshers, you are at right place. There are lot of opportunities
from many reputed companies in the world. According to research CheckPoint has a market share of about 2.1%. So, You still have
opportunity to move ahead in your career in CheckPoint Engineering. Mindmajix offers Advanced CheckPoint Interview Questions 2018
that helps you in cracking your interview & acquire dream career as CheckPoint Engineer.

Are you intereted in taking up for CheckPoint Certification Training? Enroll for Free Demo on
CheckPoint Training! (https://mindmajix.com/checkpoint-training)
Q. Where you can view the results of the checkpoint?
You can view the results of the checkpoints in the Test Result Window.
Note: If you want to retrieve the return value of a checkpoint (a boolean value that indicates whether the checkpoint passed or failed)
you must add parentheses around the checkpoint argument in the statement in the Expert View.
Q. What’s the Standard Checkpoint?
Standard Checkpoints checks the property value of an object in your application or web page.

Q. Which environment are supported by Standard Checkpoint?


Standard Checkpoint are supported for all add-in environments.

Q. Explain howus
 Call a on
biometric device performs in measuring metrics, when attempting to authenticate subjects?
 Leave a Message
1. False Rejection Rate
2. Crossover Error Rate
3. False Acceptance Rate.

Q. A(n) ______ is an abstract machine, which mediates all access subjects have to objects.
Reference monitor

Q. What’s the Image Checkpoint?


Image Checkpoint check the value of an image in your application or web page.

Q. Which environments are supported by Image Checkpoint?


Image Checkpoint are supported only Web environment.

Q. What’s the Bitmap Checkpoint?


Bitmap Checkpoint checks the bitmap images in your web page or application.

Q. Which environment are supported by Bitmap Checkpoints?


Bitmap checkpoints are supported all add-in environment.

Q. What’s the Table Checkpoints?


Table Checkpoint checks the information with in a table.
Q. Which environments are supported by Table Checkpoint?
Table Checkpoints are supported only ActiveX environment.

Q. What’s the Text Checkpoint?


Text Checkpoint checks that a test string is displayed in the appropriate place in your application or on web page.

Q. Which environment are supported by Test Checkpoint?


Text Checkpoint are supported all add-in environments

Q. What is Stealth Rule in checkpoint rewall.


Stealth Rule Protect Checkpoint rewall from direct access any traf c. Its rule should be place on the top of Security rule base. In this
rule administrator denied all traf c to access checkpoint rewall.

Q. What is Cleanup rule In Checkpoint Firewall.


Cleanup rule place at last of the security rule base, Its used to drop all traf c which not match with above rule and Logged. Cleanup rule
mainly created for log purpose. In this rule administrator denied all the traf c and enable log.

Check Out CheckPoint Tutorials (https://mindmajix.com/checkpoint)

Q. What is Explicit rule In Checkpoint Firewall.


Its a rule in ruse base which is manually created by network security administrator that called Explicit rule.

Q. What is 3 trier architecture component of Checkpoint Firewall.


a) Smart Console.
b) Security Management.
c) Security Gateway.

Q. What is the Packet Flow of Checkpoint rewall.


Layer 7 Inspection happens right after Destination NAT. If the traf c is to pass through the Medium-path, i.e. IPS/ ThreatPrevention/
UserCheck/ AppCheck/ URL Filtering. Streaming Library, Pattern matching, Sequence Check, etc...
After this Route Lookup happens and then Source NAT is done, followed by VPN-Encrypt and then L2 Lookup.

Q. Explain Which type of Business Continuity Plan (BCP) test involves shutting down a primary site, bringing an alternate site on-
line, and moving all operations to the alternate site?

Full interruption.

Q. Explain Which encryption algorithm has the highest bit strength?

AES

Q. A(n) _____ is an unintended communication path that can be used to violate a system security policy.
Covert channel

Q. Virtual corporations typically use a(n) _______ for maintaining centralized information assets.
Colocation

Q. Give an example for simple, physical-access control?


Lock

Q. A _______ attack uses multiple systems to launch a coordinated attack.


Distributed denial-of-service

Q. Which of the following is NOT an auditing function that should be performed regularly?
Reviewing performance logs
Q. _______ can mimic the symptoms of a denial-of-service attack, and the resulting loss in productivity can be no less devastating
to an organization.
Insuf cient bandwidth

Q. Explain How do virtual corporations maintain con dentiality?


Encryption

Q. Explain What type of document contains information on alternative business locations, IT resources, and personnel?
Business continuity plan

Q. A _______ is the rst step for determining which technical information assets should be protected.
Network diagram

Q. Explain Which of the following is the BEST method for managing users in an enterprise?
Place them in a centralized Lightweight Directory Access Protocol.

Q. What are enterprise Business Continuity Plan (BCP)?


Accidental or intentional data deletion
Severe weather disasters
Minor power outages

Q. Explain Which type of Business Continuity Plan (BCP) test involves practicing aspects of the BCP, without actually
interrupting operations or bringing an alternate site on-line?
Simulation

Explore CheckPoint Sample Resumes! Download & Edit, Get Noticed by Top Employers!
Download Now! (https://mindmajix.com/checkpoint-sample-resumes)
 
Social Share

   
(https://www.facebook.com/sharer/sharer.php?
(https://twitter.com/home?
(https://plus.google.com/share?
(https://www.linkedin.com/shareArticle?
u=https://mindmajix.com/checkpoint-
status=https://mindmajix.com/checkpoint-
url=https://mindmajix.com/checkpoint-
mini=true&url=https://mindmajix.com/checkpoint-
interview-interview-interview-interview-
questions)questions)questions)questions&title=https://mindmajix.com/checkpoint-
interview-
Previous (https://mindmajix.com/ccnp-interview- Next (https://mindmajix.com/chef-devops-interview-
questions&summary=&source=)
questions) questions)

2 Comments Mindmajix 
1 Login

Sort by Best
 Recommend ⤤ Share

Join the discussion…

LOG IN WITH
OR SIGN UP WITH DISQUS ?

Name

Rishi Sharma • 2 months ago


Please correct the answer to this question. Your answer is partially incorrect.

Q. What is the Packet Flow of Checkpoint firewall.

Layer 7 Inspection happens right after Destination NAT. If the traffic is to pass through the Medium-path , i.e.
IPS/ThreatPrevention/UserCheck/AppCheck/URL Filtering. Streaming Library, Pattern matching, Sequence Check, etc are all carried
in this.
Only after this Route Lookup happens and then Source NAT is done, followed by VPN-Encrypt and then L2 Lookup.
Also, from what I know - AntiSpoofing happens after Policy Lookup.
Source : Official Checkpoint PacketFlow Architecture.
1△ ▽ • Reply • Share ›

Josna Peters Mod > Rishi Sharma • 2 months ago


Okay. Thanks Rishi for the info. We will try to evaluate it with our Technical team.

Thanks
Mindmajix.com
△ ▽ • Reply • Share ›

ALSO ON MINDMAJIX

Best Practices For Performance Tuning In SSAS Cubes Advanced SharePoint Interview Questions And Answers
2 comments • 3 months ago 2017
Josna Peters — Ok. Thanks Lee for the info. We will try to evaluate 1 comment • 3 months ago
Avatarit with our Technical team.Thanks Mindmajix.com Rajat Shukla — This is Superb Work ! Thank you for sharing !
Avatar
Learn To Build Your First Advanced Dashboard In Tableau Advanced Blue Prism Interview Questions And Answers
1 comment • 3 months ago 2017
Amy White — Fantastic blog and awesome website. I have never 2 comments • 3 months ago
Avatarseen such beautiful content. Josna Peters — Thanks Sravani Poola... Will update
Avatarsoon.ThanksMindmajix.com

✉ Subscribe d Add Disqus to your siteAdd DisqusAdd 🔒 Privacy

Popular Courses in 2018

 
 

Salesforce Training Selenium Training Splunk Training Python Training


(https://mindmajix.com/… (https://mindmajix.com/… (https://mindmajix.com/… (https://mindmajix.com/

     (5.0)      (5.0)      (5.0)      (5.0)


1245 Enrolled 3070 Enrolled 1156 Enrolled 1231 Enrolled

SEARCH 

CATEGORIES

 SAP COPA (https://mindmajix.com/sap-copa/)

 Hibernate Validator (https://mindmajix.com/hibernate-validator/)

 SQL SERVER (https://mindmajix.com/sql-server/)

 Jenkins (https://mindmajix.com/jenkins/)

 Six Sigma (https://mindmajix.com/six-sigma/)

 Oracle AIA (https://mindmajix.com/oracle-aia/)


 IBM WMB (https://mindmajix.com/ibm-wmb/)

 IBM Security QRadar SIEM (https://mindmajix.com/ibm-security-qradar-siem/)

 Kernel RTOS Development (https://mindmajix.com/kernel-rtos-development/)

 Oracle SCM (https://mindmajix.com/oracle-scm/)

VIEW MORE (https://mindmajix.com/blog-category)

RELATED POSTS

CheckPoint Interview Questions (https://mindmajix.com/checkpoint-interview-questions)

Jan 02, 2017

(https://mindmajix.com/)
Mindmajix - Online global training platform connecting individuals with the best trainers around the globe. With the diverse range
of courses, Training Materials, Resume formats and On Job Support, we have it all covered to get into IT Career. Instructor Led
Training - Made easy.

 
(https://plus.google.com/+Mindmajix-
(https://www.linkedin.com/company/mindmajix-
Company online-technologies-
  IT- pvt-
(https://www.facebook.com/MindMajixTechnologies)
(https://twitter.com/mindmajix)
trainings)
ltd-)
Home (https://mindmajix.com/)

About Us (https://mindmajix.com/about)

Courses (https://mindmajix.com/course)

Sample Resumes (https://mindmajix.com/resume)

Blog (https://mindmajix.com/blog)

Contact Us (https://mindmajix.com/contact)

Reviews (https://mindmajix.com/review)

Trending Courses

Tableau Training (https://mindmajix.com/tableau-training)

Oracle DBA training (https://mindmajix.com/oracle-dba-training)

Qlikview Training (https://mindmajix.com/qlikview-training)

Docker Training (https://mindmajix.com/docker-training)

JBoss Training (https://mindmajix.com/jboss-training)

Potrebbero piacerti anche