Interview Questions on Check Point Firewall

Interview Questions on Check Point Firewall

 

1)From which was the first version of Checkpoint you worked?

2)What is the difference between CP NG and CP NGX?

3)In how many modes we can install the checkpoint?

4)What is the architecture of Checkpoint?

5)What is SIC?

6)What is NAT and how many types of NAT supported by CP explain?

7)What is unicast and multicast?

8)What is rules define Stealth and Clean up the rule?

9)Can we configure rules above the stealth rule?

10)What is the purpose of the cleanup rule?

11)How you can configure smart view clients on a new pc?

12)How you are taking backup of CP?

13)How you can take manual backup and which folders are necessary?

14)How you can configure the Log server and wherein CP we configure it?

15)How do you use a smart view tracker tell about three pannes of it.

16)Have you ever configure smart defense if yes tell us a few features of it.

17)What are the important communication ports of the checkpoint?

18)Tell me about the license part of the CP and types of it.

19)How you can integrate gateway boxes with CP like Nokia and Nortel or UTM boxes?

20)How you can bring up Nokia box integration with the CP server.

21)Have you configure Cluster in CP if yes then tell us the process?

22)What is VRRP?

23)What is the FW monitor?

24)Try to give 5 important CLI commands which are helpful for CP admin?

25)Have you done CCSA if yes then what is the career path for it and how many questions were there.

26)What is Bi-directional NAT?

27)If the log folder is crossed the threshold value which you had defined in the CP server then what will happen?

28)What is the use of database revision control?

29)Have you ever configure VPN if yes then tell us about Site to Site with IPSEC in CP?

30)Have you ever upgrade the R60 to R62 or R65 if yes then tell us the process?

31)What is FW unload local

32)If the log tracker is showing green means accepted even though the defined rule is not working then what causes might be telling us.?

33)What is SYNC in the cluster?

35)What is stateful inspection technology?

36)Apart from Stateful which another technology firewall belongs to?

37)Difference between ASA and Checkpoint firewall?

38)What is the ICMP default setting in the global properties of CP?

39)How you can reconfigure the SIC password?

40)If you restarted the remote gateway then what will happen in the CP network?

 

What is a firewall?

Describe, generally, how to manage a firewall

What is a Denial of Service attack?

What is a “spoofed” packet?

What is an SYN Flood?

What do you do if you are a victim of a DoS?

What is GPG/PGP?

What is SSH?

What is SSL? How do you create certificates?

What would you do if you discovered a UNIX or Network device on your network has been compromised?

What would you do if you discovered a Windows system on your network has been compromised?

What is DNS Hijacking?

What is a log host?

What is IDS or IDP, and can you give me an example of one?

Why are proxy servers useful?

What is web-caching?

No comments:

Post a Comment