Check Point Certification Exams Interview Preparation Guide Download PDF
Check Point Certification Exams guideline for job interview preparation. Explore list of Check Point Certification Exams frequently asked questions(FAQs) asked in number of Check Point Certification Exams interviews. Post your comments as your suggestions, questions and answers on any Check Point Certification Exams Interview Question or answer. Ask Check Point Certification Exams Question, your question will be answered by our fellow friends.
35 Check Point Certification Questions and Answers:
Table of Contents:
2 :: Explain Which of the following can be stored on a workstation? (Choose TWO.)
A. Payroll information
B. Data objects used by many employees
C. Databases
D. Interoffice memo
E. Customer correspondence
D. Interoffice memo
E. Customer correspondence
E. Customer correspondence
4 :: Explain Who should have physical access to network-connectivity devices and corporate servers?
A. Customers and clients
B. Accounting, information-technology, and auditing staff
C. Managers and C-level executives
D. Only appropriate information-technology personnel
D. Only appropriate information-technology personnel
5 :: _______ is a method of tricking users into revealing passwords, or other sensitive information.
A. Dumpster diving
B. Means testing
C. Social engineering
D. Risk
E. Exposure
C. Social engineering
6 :: Explain Which of the following are enterprise administrative controls? (Choose TWO.)
A. Network access control
B. Facility access control
C. Password authentication
D. Background checks
E. Employee handbooks
D. Background checks
E. Employee handbooks
E. Employee handbooks
8 :: Explain Which of the following tests provides testing teams some information about hosts or networks?
A. Partial-knowledge test
B. Full-knowledge test
C. Zero-knowledge test
A. Partial-knowledge test
10 :: _______ intrusion-detection systems learn the behavior of a machine or network, and create a
baseline.
A. Behavioral analysis
B. Statistical anomaly
C. Network
D. Pattern matching
E. Host
B. Statistical anomaly
12 :: Explain Which of the following should be included in an enterprise Business Continuity Plan (BCP)?
(Choose THREE.)
A. Accidental or intentional data deletion
B. Severe weather disasters
C. Employee terminations
D. Employee administrative leave
E. Minor power outages
A. Accidental or intentional data deletion
B. Severe weather disasters
E. Minor power outages
B. Severe weather disasters
E. Minor power outages
13 :: Explain Which of the following is the BEST method for managing users in an enterprise?
A. Enter user data in a spreadsheet.
B. Implement centralized access control.
C. Deploy Kerberos.
D. Place them in a centralized Lightweight Directory Access Protocol.
E. Use a Domain Name System.
D. Place them in a centralized Lightweight Directory Access Protocol.
19 :: Which of the following is NOT an auditing function that should be performed regularly?
A. Reviewing IDS alerts
B. Reviewing performance logs
C. Reviewing IDS logs
D. Reviewing audit logs
E. Reviewing system logs?
B. Reviewing performance logs