Sponsored Links

Interview Questions


Question: Operating-system fingerprinting uses all of the following, EXCEPT ________, to identify a target
operating system.
A. Sequence Verifier
B. Initial sequence number
C. Address spoofing
D. Time to Live
E. IP ID field

Answer: C. Address spoofing

Category Check Point Certification Exams Interview Questions & Answers - Exam Mode / Learning Mode
Rating (0.3) By 7423 users
Added on 7/29/2015
Views 70126
Rate it!

Question: Operating-system fingerprinting uses all of the following, EXCEPT ________, to identify a target
operating system.
A. Sequence Verifier
B. Initial sequence number
C. Address spoofing
D. Time to Live
E. IP ID field


C. Address spoofing Source: CoolInterview.com

If you have the better answer, then send it to us. We will display your answer after the approval.
Rules to Post Answers in CoolInterview.com:-
  • There should not be any Spelling Mistakes.
  • There should not be any Gramatical Errors.
  • Answers must not contain any bad words.
  • Answers should not be the repeat of same answer, already approved.
  • Answer should be complete in itself.
Name :*
Email Id :*
Answer :*
Verification Code Code Image - Please contact webmaster if you have problems seeing this image code Not readable? Load New Code
Process Verification Enter the above shown code: *
Inform me about updated answers to this question

Related Questions
View Answer
____________________ educate(s) security administrators and end users about organizations'
security policies.
A. Security-awareness training
B. Information Security (INFOSEC) briefings
C. Acceptable-use policies
D. Continuing education
E. Nondisclosure agreements
View Answer
Which of the following is the BEST method for managing users in an enterprise?
A. Enter user data in a spreadsheet.
B. Implement centralized access control.
C. Deploy Kerberos.
D. Place them in a centralized Lightweight Directory Access Protocol.
E. Use a Domain Name System.
View Answer
You are considering purchasing a VPN solution to protect your organization's information assets.
The solution you are reviewing uses RFC-compliant and open-standards encryption schemes.
The vendor has submitted the system to a variety of recognized testing authorities. The vendor
does not make the source code available to testing authorities. Does this solution adhere to the
secure design principle of open design?
A. No, because the software vendor could have changed the code after testing, which is not
B. No, because the software vendor submitted the software to testing authorities only, and did not
make the software available to the public for testing.
C. Yes, because the methods were tested by recognized testing authorities, and the source code
is protected from vandalism.
D. Yes, because the methods are open, and the system does not rely on the secrecy of its
internal mechanisms to provide protection.
E. No, because if a software vendor refuses to reveal the source code for a product, it cannot
comply with the open-design principle.
View Answer
Distinguish between the role of the data owner and the role of the data custodian. Complete the
following sentence. The data owner is the:
A. Department in the organization responsible for the data's physical storage location. The data
custodian is anyone who has access the data for any reason.
B. Person or entity who accesses/and or manipulates data or information, in the course of
assigned duties. The data custodian is a person or process with the appropriate level of
privilege to access the data.
C. Person or entity ultimately responsible for the security of an information asset. The data
custodian is the person or entity responsible for imposing and enforcing policies and
restrictions, dictated by the data owner.
D. Person or process that originally creates the information. The data custodian is a role that
shifts to any person or process currently accessing the data, and passes to the next person or
process to access the data.
E. Person or entity responsible for imposing and enforcing policies and restrictions, dictated by
the functional user. The data custodian is a person or process who accesses and/or
manipulates the information.
View Answer
____________________ is the state of being correct, or the degree of certainty a person or
process can have, that the data in an information asset is correct.
A. Confidentiality
B. Integrity
C. Authenticity
D. Privacy
E. Availability
View Answer
Which of the following is NOT a Business Continuity Plan (BCP) recovery strategy?
A. Delegating risk to another entity, such as an insurer
B. Manual procedures; alternative solution to technology available
C. Deferring action; action waiting until a later date
D. Reciprocal agreements with another organization
E. Doing nothing; no action taken to recover the technology
View Answer
What is single sign-on? An authentication method:
A. that allows users to authenticate once, and then uses tokens or other credentials to manage
subsequent authentication attempts
B. that stores user credentials locally, so that users need only authenticate the first time, a local
machine is used
C. requiring the use of one-time passwords, so users authenticate only once, with a given set of
D. that uses smart cards, hardware tokens, and biometrics to authenticate users; also known as
three-factor authentication
E. that requires users to re-authenticate for every resource accessed
View Answer
A (n) _______ occurs when intrusion-detection measures fail to recognize suspicious traffic or
A. False positive
B. False negative
C. CIFS pop-up
D. Threshold
E. Alarm
View Answer
Why should each system user and administrator have individual accounts? (Choose TWO.)
A. Using generic user names and passwords increases system security and reliability.
B. Using separate accounts for each user reduces resource consumption, particularly disk space.
C. By using individual login names and passwords, user actions can be traced.
D. If users do not have individual login names, processes can automatically run with
root/administrator access.
E. A generic user name and password for users and security administrators provides anonymity,
which prevents useful logging and auditing.
View Answer
Embedding symbols in images or common items, such as pictures or quilts, is an example of
A. Espionage
B. Transposition cipher
C. Key exchange
D. Arithmancy
E. Steganography
View Answer
At ABC Corporation, access to critical information resources, such as database and e-mail
servers, is controlled by the information-technology (IT) department. The supervisor in the
department grants access to printers where the printer is located. Managers grant and revoke
rights to files within their departments' directories on the file server, but the IT department controls
who has access to the directories. Which type of access-management system is in use at ABC
A. Centralized access management
B. Role-based access management
C. Hybrid access management
D. Decentralized access management
E. Privileged access management
View Answer
A _______ _______ posture provides many levels of security possibilities, for access control.
A. Layered defensive
B. Multiple offensive
C. Flat defensive
D. Reactive defensive
E. Proactive offensive
View Answer
Which TWO of the following items should be accomplished, when interviewing candidates for a
position within an organization?
A. Hire an investigation agency to run background checks.
B. Verify all dates of previous employment.
C. Question candidates, using polygraphs.
D. Contact personal and professional references.
E. Run criminal-background checks.
View Answer
Which of the following are common failures that should be addressed in an organization's
Business Continuity Plan (BCP) ? (Choose THREE.)
A. Connectivity failures
B. Accounting failures
C. Hardware failures
D. Utility failures
E. Personal failures
View Answer
If e-mail is subject to review by individuals other than the sender and recipient, what should be
clearly stated in the organization's e-mail policy?
A. Technologies and methods used to monitor and enforce the organization's policies
B. Senior management and business-unit owner responsibilities and delegation options
C. Clear, legally defensible definition of what constitutes a business record
D. Consequences for violation of the organization's acceptable-use policy
E. No expectation of privacy for e-mail communications, using the organization's resources
View Answer
When should procedures be evaluated?
A. When new functional users join an organization
B. On the anniversary of the procedures' implementation
C. Each time procedures are used
D. Whenever business processes are modified
E. When new exploits and attacks are discovered
View Answer
_______ involves gathering pieces of information and drawing a conclusion, whose sensitivity
exceeds any of the individual pieces of information.
A. Inference
B. Social engineering
C. Movement analysis
D. Communication-pattern analysis
E. Aggregation
View Answer
Public servers are typically placed in the _______, to enhance security.
A. Restricted Entry Zone
B. Open Zone
C. Internet Zone
D. Demilitarized Zone
E. Public Entry Zone
View Answer
_________________ is the process of subjects establishing who they are to an access control.
A. Identification
B. Authentication
C. Authorization
D. Validation
E. Biometrics
View Answer
Which of these strategies can be employed to test training effectiveness? (Choose THREE.)
A. Create a survey for managers, to see if participants practice behaviors presented during
B. Provide feedback forms for employees to rate instruction and training material, immediately
after training has ended.
C. Include auditors before and after the training. This checks to see if the number of security-
related incidents is reduced, because of the training.
D. Give incentives to employees who attend security-awareness training. Perform spot-checks, to
see if incentives are displayed.
E. Test employees on security concepts several months after training has ended.
View Answer

Please Note: We keep on updating better answers to this site. In case you are looking for Jobs, Pls Click Here Vyoms.com - Best Freshers & Experienced Jobs Website.

View All Check Point Certification Exams Interview Questions & Answers - Exam Mode / Learning Mode

User Options
India News Network

Latest 20 Questions
Payment of time- barred debt is: (a) Valid (b) Void (c) Illegal (d) Voidable
Consideration is defined in the Indian Contract Act,1872 in: (a) Section 2(f) (b) Section 2(e) (c) Section 2(g) (d) Section 2(d)
Which of the following is not an exception to the rule, "No consideration, No contract": (a) Natural love and affection (b) Compensation for involuntary services (c) Completed gift (d) Agency
Consideration must move at the desire of: (a) The promisor (b) The promisee (c) The promisor or any other party (d) Both the promisor and the promisee
An offer which is open for acceptance over a period of time is: (a) Cross Offer (b) Counter Offer (c) Standing Offer (d) Implied Offer
Specific offer can be communicated to__________ (a) All the parties of contract (b) General public in universe (c) Specific person (d) None of the above
_________ amounts to rejection of the original offer. (a) Cross offer (b) Special offer (c) Standing offer (d) Counter offer
A advertises to sell his old car by advertising in a newspaper. This offer is caleed: (a) General Offer (b) Special Offer (c) Continuing Offer (d) None of the above
In case a counter offer is made, the original offer stands: (a) Rejected (b) Accepted automatically (c) Accepted subject to certain modifications and variations (d) None of the above
In case of unenforceable contract having some technical defect, parties (a) Can sue upon it (b) Cannot sue upon it (c) Should consider it to be illegal (d) None of the above
If entire specified goods is perished before entering into contract of sale, the contract is (a) Valid (b) Void (c) Voidable (d) Cancelled
______________ contracts are also caled contracts with executed consideration. (a) Unilateral (b) Completed (c) Bilateral (d) Executory
A offers B to supply books @ Rs 100 each but B accepts the same with condition of 10% discount. This is a case of (a) Counter Offer (b) Cross Offer (c) Specific Offer (d) General Offer
_____________ is a game of chance. (a) Conditional Contract (b) Contingent Contract (c) Wagering Contract (d) Quasi Contract
There is no binding contract in case of _______ as one's offer cannot be constructed as acceptance (a) Cross Offer (b) Standing Offer (c) Counter Offer (d) Special Offer
An offer is made with an intention to have negotiation from other party. This type of offer is: (a) Invitation to offer (b) Valid offer (c) Voidable (d) None of the above
When an offer is made to the world at large, it is ____________ offer. (a) Counter (b) Special (c) General (d) None of the above
Implied contract even if not in writing or express words is perfectly _______________ if all the conditions are satisfied:- (a) Void (b) Voidable (c) Valid (d) Illegal
A specific offer can be accepted by ___________. (a) Any person (b) Any friend to offeror (c) The person to whom it is made (d) Any friend of offeree
An agreement toput a fire on a person's car is a ______: (a) Legal (b) Voidable (c) Valid (d) Illegal

Fresher Jobs | Experienced Jobs | Government Jobs | Walkin Jobs | Company Profiles | Interview Questions | Placement Papers | Companies In India | Consultants In India | Colleges In India | Exams In India | Latest Results | Notifications In India | Call Centers In India | Training Institutes In India | Job Communities In India | Courses In India | Jobs by Keyskills | Jobs by Functional Areas

Testing Articles | Testing Books | Testing Certifications | Testing FAQs | Testing Downloads | Testing Interview Questions | Testing Jobs | Testing Training Institutes

Gate Articles | Gate Books | Gate Colleges | Gate Downloads | Gate Faqs | Gate Jobs | Gate News | Gate Sample Papers | Gate Training Institutes

MBA Articles | MBA Books | MBA Case Studies | MBA Business Schools | MBA Current Affairs | MBA Downloads | MBA Events | MBA Notifications | MBA FAQs | MBA Jobs
MBA Job Consultants | MBA News | MBA Results | MBA Courses | MBA Sample Papers | MBA Interview Questions | MBA Training Institutes

GRE Articles | GRE Books | GRE Colleges | GRE Downloads | GRE Events | GRE FAQs | GRE News | GRE Training Institutes | GRE Sample Papers

IAS Articles | IAS Books | IAS Current Affairs | IAS Downloads | IAS Events | IAS FAQs | IAS News | IAS Notifications | IAS UPSC Jobs | IAS Previous Question Papers
IAS Results | IAS Sample Papers | IAS Interview Questions | IAS Training Institutes | IAS Toppers Interview

SAP Articles | SAP Books | SAP Certifications | SAP Companies | SAP Study Materials | SAP Events | SAP FAQs | SAP Jobs | SAP Job Consultants
SAP Links | SAP News | SAP Sample Papers | SAP Interview Questions | SAP Training Institutes |

Copyright ©2003-2024 CoolInterview.com, All Rights Reserved.
Privacy Policy | Terms and Conditions