InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
In what way are Cpstop/cpstart and Fwstop/fwstart different? |
Answer»
During your interview, a good interviewer will RARELY plan ahead to ask you specific QUESTIONS. Usually, they begin with a basic concept of the subject and then continue based on what you SAY and follow-up questions. These questions are INTENDED to GIVE you an idea of the type of question you may encounter during your CheckPoint interview. Useful Resources:
|
|
| 2. |
What is Granular Routing Control? |
|
Answer» In the network, the GRANULAR Routing Control (GRC) is used to granularly control VPN (Virtual Private Network) traffic. USING this FEATURE, you can ENABLE the Security Gateway to:
|
|
| 3. |
Explain Checkpoint DLP (Data Loss Prevention). |
|
Answer» Data LOSS prevention (DLP) is a cybersecurity methodology that combines technology and best practices in order to help prevent sensitive data from being DIVULGED (disclosed) outside of an organization. In particular, the data MAY include regulated information such as PII (Personally Identifiable Information) or compliance data such as HIPAA (Health Insurance Portability and Accountability ACT), PCI (PAYMENT Card Industry), SOX (Sarbanes-Oxley Act), etc. Your business is protected against unintentional loss of sensitive and valuable information by Check Point DLP. With DLP, businesses can monitor data movement and empower employees to work confidently while staying compliant with industry regulations. |
|
| 4. |
Explain the functions of CPD, FWM, and FWD processes. |
Answer»
|
|
| 5. |
State difference between Automatic NAT and Manual NAT. |
||||||||||
|
Answer» NAT (Network ADDRESS Translation) can be configured in Checkpoint Firewall either manually or AUTOMATICALLY.
|
|||||||||||
| 6. |
What do you mean by Source NAT, Hide NAT, and Destination NAT? |
|
Answer» Security GATEWAYS can USE the following TYPES of NAT (Network Address Translation) to translate IP addresses:
|
|
| 7. |
Explain NAT (Network Address Translation). |
|
Answer» NAT refers to network address translation. NAT (Network Address Translation) is Firewall Software Blade's feature and ensures greater security by replacing/translating IPv4 and IPv6 addresses. NAT hides internal IP addresses from the Internet in order to protect the identity of a network. A firewall can alter both the source and destination IP addresses of a packet. The firewall, for example, translates the source IP address (to a new one) of packets that go from an internal computer to an external computer. Firewalls translate the new IP addresses back to the original IP addresses as packets RETURN from the external computer. When packets return from the external computer, they are routed to the correct internal computer. Example: Suppose a network has 1,000 computers but one internet connection. What makes it possible that 1000 devices can access one internet connection, right? This is made possible by NAT. A private IP address is assigned to each of the 1000 computers, i.e., (10.0._._), and they are all connected to the ROUTER. It is connected directly to the internet and has NAT settings configured. When PC 1 (which has an IP address of 10.0.0.1) attempts to access the internet (www.google.com), it will first send a request to the router, and the router converts the private IP address into a public IP address (10.0.0.1 - 12.0.0.1) and FORWARDS the request to the Google web server. This information is, however, saved in the NAT forwarding table by the router before forwarding this request. So, when the RESPONSE comes from the web server, the router can CONVERT the public IP back to the private IP (12.0.0.1 - 10.0.0.1), and deliver the information back to the requested PC. |
|
| 8. |
What do you mean by perimeter? What kind of connections does the firewall permit on the perimeter? |
|
Answer» Typically, a perimeter acts as a security boundary or border that PROVIDES the main defence of an INTERNAL (private) network and other public networks (such as the internet or external network). Firewalls on the perimeter of the network handle all incoming/outgoing TRAFFIC. Firewalls on perimeters usually allow the following connections: |
|
| 9. |
What is the Demilitarized Zone (DMZ)? |
|
Answer» The DMZ network, also called a Demilitarized Zone, is a subnetwork WITHIN an organization's network infrastructure that LIES between the untrusted network (INTERNET or external network) and the protected internal network. DMZ networks CONTAIN the organization's public-facing services and are designed to protect the internal network. A DMZ should contain any services that can be accessed by users connecting from an external network. The most common services are Web servers, mail servers, and FTP (File Transfer Protocol) servers. For both individuals and large ORGANIZATIONS, DMZs are crucial to network security. They offer an additional layer of security to a computer network by restricting remote access to internal data and servers, which, if breached, can have devastating effects. |
|
| 10. |
Explain Security Zone. |
|
Answer» With Security Zones, you can create a powerful Access Control Policy that controls the flow of traffic between different parts of a network. Different security zones are used by networks to protect resources and to combat malware on networks. Set up rules so that only appropriate traffic can enter and leave a security zone. Listed below are the predefined Security Zones, along with their intended purpose:
|
|
| 11. |
What do you mean by Asymmetric Encryption? |
|
Answer» There are two types of keys in ASYMMETRIC encryption i.e., PUBLIC and private keys. There is a pair of private and public keys for each party. The public key, as its name implies, can be exchanged securely with communication PARTNERS, while the private key must remain confidential (secret). The private key is TYPICALLY used to decrypt data, while the public key is used to encrypt data. To encrypt traffic between Jessica and Monica, as depicted in the above figure, the pair will exchange public keys.
Therefore, before any encrypted communication can take place, Jessica and Monica must exchange public keys. |
|
| 12. |
Can you explain what is anti-spoofing in Checkpoint? |
|
Answer» The concept of anti-spoofing aims to detect and drop packets with a bogus (FALSE) source address. By using Anti-Spoofing, we can determine if a packet with an IP address concealed behind a certain interface is actually arriving from a different interface. A packet from an external network with an internal IP address, for example, would automatically be blocked by Anti-Spoofing. It ensures that packets are going to and coming from the correct INTERFACES on the SECURITY gateway. Example: In the following diagram, a Security Gateway is shown with interfaces 2, 3, and 4, as well as some example networks. When Anti-Spoofing is enabled on the Security Gateway, it ensures that:
Packets with source IP addresses in network 192.168.33.0 that arrive at interface 2 or 4 are blocked since the source address has been spoofed. |
|
| 13. |
How do you prevent IP Spoofing? |
|
Answer» IP spoofing MEANS the use of one’s IP address to appear as if it is a trusted IP address, USUALLY for DDOS attacks or to reroute communication. A hacker uses IP spoofing to REPLACE an untrustworthy SOURCE IP address with a fake, trusted one in order to hijack connections to your network. Attackers can send malware and bots to your network, execute DoS attacks, and gain unauthorized access to your systems. |
|
| 14. |
State difference between ESP and AH IPSec Protocol. |
||||||
|
Answer» IPSEC uses two DIFFERENT protocols defined by IETF (Internet Engineering Task Force): AH (Authentication Header) and ESP (ENCAPSULATING Security Payload)
|
|||||||
| 15. |
Explain IKE and IPSec. |
|
Answer» For managing encryption keys and sending encrypted packets, CheckPoint VPNs (Virtual Private Networks) UTILIZE two secure VPN protocols as follows:
|
|
| 16. |
Explain VPN (Virtual Private Network). |
|
Answer» Many network protocols include encryption, but not all Internet traffic does. An attacker may therefore be able to intercept and change data as it flows over a network. Fortunately, virtual private networks (VPNs) ALLEVIATE this issue. VPNs are used to establish a safe and secure connection (private connection) between two points and allow them to communicate securely over a public network. In ESSENCE, VPNs provide a private, encrypted connection between two points - without stating which points they should be. As a result, VPN services can be used for a variety of purposes:
|
|