InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Explain Which Type Of Business Continuity Plan (bcp) Test Involves Practicing Aspects Of The Bcp, Without Actually Interrupting Operations Or Bringing An Alternate Site On-line? |
|
Answer» Simulation. Simulation. |
|
| 2. |
What Are Enterprise Business Continuity Plan (bcp)? |
| Answer» | |
| 3. |
Explain Which Of The Following Is The Best Method For Managing Users In An Enterprise? |
|
Answer» PLACE them in a centralized LIGHTWEIGHT DIRECTORY Access PROTOCOL. Place them in a centralized Lightweight Directory Access Protocol. |
|
| 4. |
Explain What Type Of Document Contains Information On Alternative Business Locations, It Resources, And Personnel? |
|
Answer» Business continuity plan. |
|
| 5. |
Explain How Do Virtual Corporations Maintain Confidentiality? |
|
Answer» Encryption. Encryption. |
|
| 6. |
Which Of The Following Is Not An Auditing Function That Should Be Performed Regularly? |
|
Answer» Reviewing performance logs. |
|
| 7. |
Give An Example For Simple, Physical-access Control? |
|
Answer» Lock. Lock. |
|
| 8. |
Explain Which Encryption Algorithm Has The Highest Bit Strength? |
|
Answer» AES AES |
|
| 9. |
Explain Which Type Of Business Continuity Plan (bcp) Test Involves Shutting Down A Primary Site, Bringing An Alternate Site On-line, And Moving All Operations To The Alternate Site? |
|
Answer» Full interruption. |
|
| 10. |
What Is The Packet Flow Of Checkpoint Firewall? |
Answer»
|
|
| 11. |
What Is 3 Tier Architecture Component Of Checkpoint Firewall? |
Answer»
|
|
| 12. |
What Is Explicit Rule In Checkpoint Firewall? |
|
Answer» Its a rule in RUSE base which is MANUALLY created by network security ADMINISTRATOR that CALLED Explicit rule. Its a rule in ruse base which is manually created by network security administrator that called Explicit rule. |
|
| 13. |
What Is Cleanup Rule In Checkpoint Firewall? |
|
Answer» CLEANUP RULE place at last of the security rule BASE, Its used to drop all traffic which not match with above rule and Logged. Cleanup rule mainly CREATED for log purpose. In this rule administrator denied all the traffic and ENABLE log. Cleanup rule place at last of the security rule base, Its used to drop all traffic which not match with above rule and Logged. Cleanup rule mainly created for log purpose. In this rule administrator denied all the traffic and enable log. |
|
| 14. |
What Is Stealth Rule In Checkpoint Firewall? |
|
Answer» STEALTH Rule Protect Checkpoint FIREWALL from direct access any traffic. Its rule should be place on the top of Security rule base. In this rule ADMINISTRATOR DENIED all traffic to access checkpoint firewall. Stealth Rule Protect Checkpoint firewall from direct access any traffic. Its rule should be place on the top of Security rule base. In this rule administrator denied all traffic to access checkpoint firewall. |
|
| 15. |
Which Environment Are Supported By Test Checkpoint? |
|
Answer» TEXT CHECKPOINT are SUPPORTED all add-in ENVIRONMENTS. Text Checkpoint are supported all add-in environments. |
|
| 16. |
What’s The Text Checkpoint? |
|
Answer» Text Checkpoint CHECKS that a test STRING is displayed in the APPROPRIATE PLACE in your application or on WEB page. Text Checkpoint checks that a test string is displayed in the appropriate place in your application or on web page. |
|
| 17. |
Which Environments Are Supported By Table Checkpoint? |
|
Answer» Table CHECKPOINTS are SUPPORTED only ACTIVEX ENVIRONMENT. Table Checkpoints are supported only ActiveX environment. |
|
| 18. |
What’s The Table Checkpoints? |
|
Answer» Table CHECKPOINT CHECKS the INFORMATION with in a table. Table Checkpoint checks the information with in a table. |
|
| 19. |
Which Environment Are Supported By Bitmap Checkpoints? |
|
Answer» BITMAP CHECKPOINTS are SUPPORTED all add-in ENVIRONMENT. Bitmap checkpoints are supported all add-in environment. |
|
| 20. |
What’s The Bitmap Checkpoint? |
|
Answer» BITMAP CHECKPOINT checks the bitmap images in your WEB page or application. Bitmap Checkpoint checks the bitmap images in your web page or application. |
|
| 21. |
Which Environments Are Supported By Image Checkpoint? |
|
Answer» IMAGE CHECKPOINT are SUPPORTED only WEB ENVIRONMENT. Image Checkpoint are supported only Web environment. |
|
| 22. |
What’s The Image Checkpoint? |
|
Answer» IMAGE Checkpoint check the VALUE of an image in your application or WEB PAGE. Image Checkpoint check the value of an image in your application or web page. |
|
| 23. |
Explain How A Biometric Device Performs In Measuring Metrics, When Attempting To Authenticate Subjects? |
Answer»
|
|
| 24. |
Which Environment Are Supported By Standard Checkpoint? |
|
Answer» STANDARD CHECKPOINT are SUPPORTED for all add-in ENVIRONMENTS. Standard Checkpoint are supported for all add-in environments. |
|
| 25. |
What’s The Standard Checkpoint? |
|
Answer» STANDARD Checkpoints checks the PROPERTY value of an object in your application or WEB page. Standard Checkpoints checks the property value of an object in your application or web page. |
|
| 26. |
Where You Can View The Results Of The Checkpoint? |
|
Answer» You can VIEW the results of the checkpoints in the Test RESULT WINDOW. Note: If you want to retrieve the return value of a checkpoint (a boolean value that indicates WHETHER the checkpoint passed or failed) you must add PARENTHESES around the checkpoint argument in the statement in the Expert View. You can view the results of the checkpoints in the Test Result Window. Note: If you want to retrieve the return value of a checkpoint (a boolean value that indicates whether the checkpoint passed or failed) you must add parentheses around the checkpoint argument in the statement in the Expert View. |
|