Check Point Solved MCQ
Check Point Solved MCQ contain set of 10 MCQ questions for Check Point MCQ which will help you to clear beginner level quiz.
1. What is the primary function of a firewall?
- To enforce security between the user and the Internet
- To enforce security in communications between internal and external networks
- To enforce security in communications between the internal networks only
- To enforce security in communications between the extranets
2. Which of the following Firewall technology works at the Network Layer of ISO/OSI model?
- Application Layer Gateways
- Authentication Servers
- Encryption Servers
- Packet Filters
3. A FireWall module is NOT likely to be installed at/on which of the following?
- Enforcement Point
- FireWalled host
- FireWalled Gateway
- GUI client station
4. Which of the following best describes FireWall-1 model of operation?
- It is based on Client – Server model
- It is based on work group model
- It is based on peer working model
- It is based on NetBIOS
5. Which access right gives FireWall-1 2000 administrator full access to all Check Point products?
- Read/Write All
- Read Only All
- Customized
- Write All
6. Which parameter is NOT required for FireWall-1Security Policy login by an administrator?
- User Name
- Gateway IP address
- Management server name
- Password
7. When you connect to a Management Server for the first time from a GUI client, which of the following need to be verified to ensure that the GUI client is connected to the intended Management Server? Choose the most appropriate answer.
- IP address
- Management Server Name
- User Name and Password
- Fingerprint
8. What is the purpose of stealth rule in the Rule Base of VPN/FireWall?
- It drops all communication attemps not described by the other rules in the Rule Base.
- It is the first rule in the Rule Base that prevents traffic from directly accessing the firewall itself.
- It is the first rule in the Rule Base that drops all packets belonging to other Protocol Stacks
- It filters networks by Destination IP addresses
9. A machine acting as Gateway must at least have how many network interface cards .
- 1
- 2
- 3
- 4
10. One security protocol for the e-mail system is
1. IPsec
2. SSL
3. PGP
4. None of above