Interview Questions Answers.ORG
Interviewer And Interviewee Guide
CCIE CertificationCCSP CertificationAFMCSun CertificationGATE Exam Interviews Quizzes

Accounts

AccountingAccounts PayableAuditJunior AccountantSenior Accountant

Analysis

Data AnalystFinancial AnalystGISGIS AnalysisStatistics

Banking

ICICI Bank LtdLoan OfficerRecovery OfficerTreasuryUnderwriter

Basic Job

BehavioralBusiness intelligenceFreshers GraduatePuzzlesTargeted Selection

Best Engineering

Automobile EngineeringChemical EngineeringCivil EngineeringElectrical EngineeringMechanical Engineering

Best Multimedia

3D AnimationCoreldrawDesign EngineerGraphics DesignerInterior Design

Community

Cable OperatorFirefighter SpecialistFuneral DirectorSpeech PathologistTranslator

New Artist

Art DirectorAstrologistInternational RelationshipSociologyVisual Arts

9th Class

9th Class Biology9th Class Chemistry9th Class Computer Studies9th Class Pakistan StudiesEnglish Grammar Section 9th Class

Accounting

Accounting ManagementBank Probationary Officer (PO)Financial Accounting Exam MCQsManagerial Accounting Exam MCQs

Civil Engineering

Building ConstructionRailwaysRCC Structures DesignSoil Mechanics and Foundation EngineeringSurveying

Engineering

Electrical EngineeringElectronic DevicesElectronics EngineeringEngineering MechanicsSoftware Engineering

General Knowledge (GK)

General Knowledge (GK)IQ (Intelligence Quotient)Permutation And CombinationPhysical CommunicationVocabulary

Information Technology (IT)

Basics of ComputerComputer KnowledgeComputer OrganizationFundamentals Of ComputerWireless Communication

Networking

Advanced NetworkingBasic NetworkingComputer Networks TestNetwork SecurityNetworking

Soft Skills Quizzes MCQs

Communication Skills Exam MCQsCorporate Communication Exam MCQsLeadership Skills Exam MCQsNegotiation Skills Exam MCQsTime Management Exam MCQs

Certifications Interviews

AFMC IQAIIMS Exam IQCCDA Certification IQCCIE Certification IQCCIP Certification IQCCSP Certification IQCertifications IQCheck Point Certification IQCISCO Certification IQCIW Certification IQEngineering Entrance Exams IQEntrance Exams IQGATE Exam IQIBM Certification IQICET Exam IQIIT JEE IQISTQB Certification IQManagement Entrance Exams IQMAT IQMCDBA Certification IQMCSD.NET - 70-089 IQMCSD.NET - 70-300 IQMCSD.NET - 70-306 Exam IQMCSD.NET - 70-310 Exam IQMCSD.NET - 70-315 Exam IQMCSD.NET - 70-316 Exam IQMCSD.NET - 70-320 Exam IQMCSD.NET - 70-330 Exam IQMCSD.NET - 70-340 Exam IQMCTS .Net Certification IQMedical Science Entrance Exams IQMicrosoft Certification IQMSCE 2003 Certification IQNovell Certification IQNovell CLE 9 Certification IQNovell CLP Certification IQNovell CNA Certification IQNovell CNE Certification IQNovell MCNE Certification IQOCP 9i DBA Certification IQOPENMAT Exam IQOracle Application Developer IQOracle Certification IQPMI Certification IQPost Graduation Entrance Exams IQRed Hat Certification IQS/W Quality Assurance IQSun Certification IQSybase Certification IQTesting Certification IQ

Operational Check Point Certification Interview Questions & Answers:

1. Explain Which type of Business Continuity Plan (BCP) test involves practicing aspects of the BCP,
without actually interrupting operations or bringing an alternate site on-line?
A. Structured walkthrough
B. Checklist
C. Simulation
D. Full interruption
E. Parallel

C. Simulation

2. Explain Which of the following can be stored on a workstation? (Choose TWO.)
A. Payroll information
B. Data objects used by many employees
C. Databases
D. Interoffice memo
E. Customer correspondence

D. Interoffice memo
E. Customer correspondence

3. A(n) ______________________________ is a quantitative review of risks, to determine how an
organization will continue to function, in the event a risk is realized.
A. Monitored risk process
B. Disaster-recovery plan
C. Business impact analysis
D. Full interruption test
E. Information security audit

C. Business impact analysis

4. Explain Who should have physical access to network-connectivity devices and corporate servers?
A. Customers and clients
B. Accounting, information-technology, and auditing staff
C. Managers and C-level executives
D. Only appropriate information-technology personnel

D. Only appropriate information-technology personnel

5. _______ is a method of tricking users into revealing passwords, or other sensitive information.
A. Dumpster diving
B. Means testing
C. Social engineering
D. Risk
E. Exposure

C. Social engineering

6. Explain Which of the following are enterprise administrative controls? (Choose TWO.)
A. Network access control
B. Facility access control
C. Password authentication
D. Background checks
E. Employee handbooks

D. Background checks
E. Employee handbooks

7. A new U.S. Federal Information Processing Standard specifies a cryptographic algorithm. This
algorithm is used by U.S. government organizations to protect sensitive, but unclassified,
information. What is the name of this Standard?
A. Triple DES
B. Blowfish
C. AES
D. CAST
E. RSA

C. AES

8. Explain Which of the following tests provides testing teams some information about hosts or networks?
A. Partial-knowledge test
B. Full-knowledge test
C. Zero-knowledge test

A. Partial-knowledge test

9. (n) ________________ is a one-way mathematical function that maps variable values into
smaller values of a fixed length.
A. Symmetric key
B. Algorithm
C. Back door
D. Hash function
E. Integrity

D. Hash function

10. _______ intrusion-detection systems learn the behavior of a machine or network, and create a
baseline.
A. Behavioral analysis
B. Statistical anomaly
C. Network
D. Pattern matching
E. Host

B. Statistical anomaly

11. Explain Which principle of secure design states that a security mechanisms methods must be testable?
A. Separation of privilege
B. Least common mechanism
C. Complete mediation
D. Open design
E. Economy of mechanism

D. Open design

12. Explain Which of the following should be included in an enterprise Business Continuity Plan (BCP)?
(Choose THREE.)
A. Accidental or intentional data deletion
B. Severe weather disasters
C. Employee terminations
D. Employee administrative leave
E. Minor power outages

A. Accidental or intentional data deletion
B. Severe weather disasters
E. Minor power outages

13. Explain Which of the following is the BEST method for managing users in an enterprise?
A. Enter user data in a spreadsheet.
B. Implement centralized access control.
C. Deploy Kerberos.
D. Place them in a centralized Lightweight Directory Access Protocol.
E. Use a Domain Name System.

D. Place them in a centralized Lightweight Directory Access Protocol.

14. A(n) _______ is the first step for determining which technical information assets should be
protected.
A. Network diagram
B. Business Impact Analysis
C. Office floor plan
D. Firewall
E. Intrusion detection system?

A. Network diagram

15. Explain What type of document contains information on alternative business locations, IT resources, and
personnel?
A. End-user license agreement
B. Nondisclosure agreement
C. Acceptable use policy
D. Security policy
E. Business continuity plan?

E. Business continuity plan

16. Organizations _______ risk, when they convince another entity to assume the risk for them.
A. Elevate
B. Assume
C. Deny
D. Transfer
E. Mitigate?

D. Transfer

17. Explain How do virtual corporations maintain confidentiality?
A. Encryption
B. Checksum
C. Data hashes
D. Redundant servers
E. Security by obscurity?

A. Encryption

18. _______ can mimic the symptoms of a denial-of-service attack, and the resulting loss in
productivity can be no less devastating to an organization.
A. ICMP traffic
B. Peak traffic
C. Fragmented packets
D. Insufficient bandwidth
E. Burst traffic?

D. Insufficient bandwidth

19. Which of the following is NOT an auditing function that should be performed regularly?
A. Reviewing IDS alerts
B. Reviewing performance logs
C. Reviewing IDS logs
D. Reviewing audit logs
E. Reviewing system logs?

B. Reviewing performance logs

20. Which of the following is an example of a simple, physical-access control?
A. Lock
B. Access control list
C. Background check
D. Token
E. Firewall?

A. Lock

21. Virtual corporations typically use a(n) _______ for maintaining centralized information assets.
A. Off-line repository
B. Floppy disk
C. Data warehouse
D. CD-ROM burner
E. Colocation?

E. Colocation

22. A _______ attack uses multiple systems to launch a coordinated attack.
A. Distributed denial-of-service
B. Teardrop
C. Birthday
D. FTP Bounce
E. Salami?

A. Distributed denial-of-service

23. A(n) _______________ is an unintended communication path that can be used to violate a
system security policy.
A. Covert channel
B. Integrity axiom
C. Simple rule violation
D. Inferred fact?

A. Covert channel

24. Explain Which type of Business Continuity Plan (BCP) test involves shutting down a primary site, bringing
an alternate site on-line, and moving all operations to the alternate site?
A. Parallel
B. Full interruption
C. Checklist
D. Structured walkthrough
E. Simulation?

B. Full interruption

25. Explain Which encryption algorithm has the highest bit strength?
A. AES
B. Blowfish
C. DES
D. CAST
E. Triple DES?

A. AES

26. Operating-system fingerprinting uses all of the following, EXCEPT ________, to identify a target
operating system.
A. Sequence Verifier
B. Initial sequence number
C. Address spoofing
D. Time to Live
E. IP ID field?

C. Address spoofing

27. ____________________ educate(s) security administrators and end users about organizations
security policies.
A. Security-awareness training
B. Information Security (INFOSEC) briefings
C. Acceptable-use policies
D. Continuing education
E. Nondisclosure agreements?

A. Security-awareness training

28. Embedding symbols in images or common items, such as pictures or quilts, is an example of
__________.
A. Espionage
B. Transposition cipher
C. Key exchange
D. Arithmancy
E. Steganography?

E. Steganography

29. Maintenance of the Business Continuity Plan (BCP) must be integrated with an organizations
_______________ process.
A. Change-control
B. Disaster-recovery
C. Inventory-maintenance
D. Discretionary-budget
E. Compensation-review?

A. Change-control

30. ____________________ is the state of being correct, or the degree of certainty a person or
process can have, that the data in an information asset is correct.
A. Confidentiality
B. Integrity
C. Authenticity
D. Privacy
E. Availability?

B. Integrity

31. Explain Which types of security solutions should a home user deploy? (Choose TWO.)
A. Managed Security Gateway
B. Access control lists on a router
C. Personal firewall
D. Network intrusion-detection system
E. Anti-virus software?

C. Personal firewall
E. Anti-virus software

32. _________ is a smaller, enhanced version of the X.500 protocol. It is used to provide directory-
service information. (Choose the BEST answer.)
A. Lightweight Directory Access Protocol
B. X.400 Directory Access Protocol
C. Access control list
D. Lightweight Host Configuration Protocol
E. Role-based access control?

A. Lightweight Directory Access Protocol

33. A(n) _______________ is an abstract machine, which mediates all access subjects have to
objects.
A. ACL
B. Reference monitor
C. State machine
D. TCB
E. Router?

B. Reference monitor

34. Explain Which of these metrics measure how a biometric device performs, when attempting to
authenticate subjects? (Choose THREE.)
A. False Rejection Rate
B. User Acceptance Rate
C. Crossover Error Rate
D. False Acceptance Rate
E. Enrollment Failure Rate?

A. False Rejection Rate
C. Crossover Error Rate
D. False Acceptance Rate

35. Suppose A (n) __________________________ is issued by senior management, and defines an
organizations security goals.
A. Records-retention procedure
B. Acceptable-use policy
C. Organizational security policy
D. Security policy mission statement
E. Service level agreement?

D. Security policy mission statement



SHARE




FORUM
PRIVACY
TERMS & CONDITIONS
FEED BACK

Submit Your Feedback:


×

Thank You For Your Feedback!

Your message has been sent successfully.

Disclaimer
Interview Questions Answers .ORG is responsive and optimized web portal for individuals to get preparation for their job interviews, learning and training. Content at Interview Questions Answers .ORG might be simplified to improve our users experience. We constantly review our content to avoid errors and copyright violations, but we cannot warrant full correctness of all the content. While using this site, you agree to have read and accepted our terms of use, cookie and privacy policy. Copyright 2007-2025 by Interview Questions Answers .ORG All Rights Reserved.

Interview Questions Answers .ORG
Face Book Twitter Linkedin