InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
What is SIC (Secure Internal Communication)? |
|
Answer» SIC stands for Secure INTERNAL Communication. As the name suggests, SIC allows CheckPoint products and platforms to communicate securely. It establishes a trusted connection or status between a gateway, management server, and other CheckPoint components. A TRUST or SIC is required for the installation of policies on gateways and the transmission (sending) of LOGS between management servers and gateways. Check Point platforms and products authenticate each other using ONE of these SIC methods:
|
|
| 2. |
What are the explicit and implied rules in Checkpoint Firewall? |
|
Answer» In the Rule Base, you will find the following types of rules:
|
|
| 3. |
Explain the Stealth rule and Cleanup rule in Checkpoint firewall. |
|
Answer» There are a few standard rules CheckPoint recommends you INCLUDE in your rule base for both security and management reasons. They are as follows:
|
|
| 4. |
What is Order of Rule Enforcement in Rule Base? |
|
Answer» Packets are INSPECTED sequentially by Check Point Security Gateways. Upon RECEIVING a packet belonging to a CONNECTION, the Security Gateway compares the data (destination, source, etc.) against the FIRST rule, then the second rule, the third rule, and so on. As soon as it finds a rule that matches, it stops checking and applies the ACTION of that particular rule to the packet. If the packet does not match any of the rules, then it is denied. |
|
| 5. |
How do you manage the Firewall Rule Base? |
||||||||||||
|
Answer» With SmartDashboard, it's EASY to create and configure Firewall RULES that ensure a STRONG security policy. Listed below are some fields used to manage rules for Firewall security policy:
|
|||||||||||||
| 6. |
What is the Checkpoint Firewall rule base? |
|
Answer» The firewall is at the core of a comprehensive NETWORK security policy. A security policy essentially consists of rules which define access control to/from networks that are protected by a Check Point Security Gateway. In order to be an effective security solution, Check Point Security Gateways need well-defined access POLICIES. The basic PRINCIPLE behind the Rule Base is that "connections that aren't explicitly ALLOWED are denied". You can create rules in Check Point Firewall Rule Base to only allow specified connections. |
|
| 7. |
State difference between SPLAT and GAIA. |
|
Answer» Due to the influx of new incoming threats and requirements for PROTECTION, companies must consolidate security to ensure an optimised security OPERATION and MAXIMUM efficiency. Check Point GAIA is a powerful, UNIFIED operating system that delivers higher security and superior efficiency over its predecessors; SPLAT operating system and IPSO operating system. GAIA Operating Systems support the full SUITE of CheckPoint Gateways, Software Blades, and Security Management products. Here are some advantages of GAIA over SPLAT/IPSO.
|
|
| 8. |
Explain the usage of SmartLog and SmartEvent Software Blade. |
Answer»
It is possible for administrators to quickly identify CRITICAL security events and take the necessary measures to prevent future attacks. |
|
| 9. |
What do you mean by Checkpoint software blades? |
|
Answer» It can be defined as an independent, modular, and centrally managed security building block, which allows an organization to customize a security CONFIGURATION tailored to their needs in terms of protection and investment. It is easy to enable and configure Software BLADES on any gateway or management system simply by clicking a MOUSE button - no additional HARDWARE, firmware, or driver upgrade is needed. As the WORLD's first and only security architecture, Check Point Software Blade provides total, flexible, and manageable security to companies of all sizes. The solution enables organizations to tweak their security infrastructure easily and efficiently in order to meet their critical and targeted business security requirements. |
|
| 10. |
What is Checkpoint IPS (Intrusion Prevention System)? |
|
Answer» An IPS (Intrusion Prevention System), also referred to as IDPS (Intrusion Detection Prevention System), USUALLY monitors a network in order to detect malicious activities that attempt to exploit a known VULNERABILITY. These technologies can HELP detect or prevent network security threats like Denial of Service (DoS) attacks, brute FORCE attacks, etc. A vulnerability can be viewed as a weakness in a software system and an exploit can be referred to as an attack that makes USE of that weakness to gain control of the software system. It is common for attackers to take advantage of newly disclosed exploits for a short period of time before the security patch is applied. These attacks can be quickly blocked using an Intrusion Prevention System. |
|
| 11. |
What do you mean by Checkpoint SecureXL, ClusterXL and CoreXL? |
Answer»
|
|
| 12. |
What are different types of Checkpoints? |
|
Answer» The following are some types of Checkpoints:
|
|
| 13. |
State differences between Stand-alone Deployment and Distributed Deployment. |
|
Answer» You can deploy CHECKPOINT firewalls as a STANDALONE system or as a distributed system. Here's how they DIFFER:- Stand-alone deployment: As part of a stand-alone deployment, both Security Management Server and Security Gateway are installed on the same PLATFORM. In this scenario, Smart Console will be installed or deployed on a separate platform with access to the Security Management Server for creating policies and pushing them to the Security Gateway. Check Point does not recommend this deployment, except for small businesses, because it defeats the whole purpose of their three-tiered architecture. Distributed deployment: Distributed deployments are most commonly known as Three-Tier architectures, where each component is installed on a separate platform, and such deployments are highly recommended by Check Point. The Smart Console is generally installed on Windows so that it can be used easily. Depending on the requirements, Security Management Server can be installed on Windows, LINUX, or FreeBSD. |
|
| 14. |
What is the 3-tier architecture component of Checkpoint Firewall? |
|
Answer» Checkpoint components are based on a 3-tier technology architecture as follows:
|
|
| 15. |
Write the main components of the Checkpoint solution. |
||||||||||||
|
Answer» The CHECKPOINT SOLUTION has the following MAIN COMPONENTS:
|
|||||||||||||