Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

156-110 Check Point Certified Security Principles Associate (CCSPA) Questions and Answers

Questions 4

Which of the following is NOT a concern for enterprise physical security?

Options:

A.

Network Intrusion Detection Systems

B.

Social engineering

C.

Dumpster diving

D.

Property theft

E.

Unauthorized access to a facility

Buy Now
Questions 5

Enterprise employees working remotely require access to data at an organization's headquarters. Which of the following is the BEST method to transfer this data?

Options:

A.

Standard e-mail

B.

Faxed information

C.

Dial-in access behind the enterprise firewall

D.

Virtual private network

E.

CD-ROMs shipped with updated versions of the data

Buy Now
Questions 6

_______ intrusion-detection systems learn the behavior of a machine or network, and create a baseline.

Options:

A.

Behavioral analysis

B.

Statistical anomaly

C.

Network

D.

Pattern matching

E.

Host

Buy Now
Questions 7

Which of the following can be stored on a workstation? (Choose TWO.)

Options:

A.

Payroll information

B.

Data objects used by many employees

C.

Databases

D.

Interoffice memo

E.

Customer correspondence

Buy Now
Questions 8

A(n) __________________________ is issued by senior management, and defines an organization's security goals.

Options:

A.

Records-retention procedure

B.

Acceptable-use policy

C.

Organizational security policy

D.

Security policy mission statement

E.

Service level agreement

Buy Now
Questions 9

Which of the following statements about encryption's benefits is false? Encryption can: (Choose TWO.)

Options:

A.

significantly reduce the chance information will be modified by unauthorized entities.

B.

only be used to protect data in transit. Encryption provides no protection to stored data.

C.

allow private information to be sent over public networks, in relative safety.

D.

significantly reduce the chance information will be viewed by unauthorized entities.

E.

prevent information from being destroyed by malicious entities, while in transit.

Buy Now
Questions 10

Which of the following is the BEST method for managing users in an enterprise?

Options:

A.

Enter user data in a spreadsheet.

B.

Implement centralized access control.

C.

Deploy Kerberos.

D.

Place them in a centralized Lightweight Directory Access Protocol.

E.

Use a Domain Name System.

Buy Now
Questions 11

ABC Corporation's network is configured such that a user must log in individually at each server and access control. Which type of authentication is in use?

Options:

A.

Role-based access control

B.

Three-factor authentication

C.

Single sign-on

D.

Hybrid access control

E.

Mandatory sign-on

Buy Now
Questions 12

_________________ is the process of subjects establishing who they are to an access control.

Options:

A.

Identification

B.

Authentication

C.

Authorization

D.

Validation

E.

Biometrics

Buy Now
Questions 13

ABC Corporation's network requires users to authenticate to cross the border firewall, and before entering restricted segments. Servers containing sensitive information require separate authentication. This is an example of which type of access-control method?

Options:

A.

Single sign-on

B.

Decentralized access control

C.

Hybrid access control

D.

Layered access control

E.

Mandatory access control

Buy Now
Questions 14

Why does the (ISC)2 access-control systems and methodology functional domain address both the confidentiality and integrity aspects of the Information Security Triad? Access-control systems and methodologies:

Options:

A.

are required standards in health care and banking.

B.

provide redundant systems and data backups.

C.

control who is allowed to view and modify information.

D.

are academic models not suitable for implementation.

E.

set standards for acceptable media-storage devices.

Buy Now
Questions 15

Which type of Business Continuity Plan (BCP) test involves shutting down a primary site, bringing an alternate site on-line, and moving all operations to the alternate site?

Options:

A.

Parallel

B.

Full interruption

C.

Checklist

D.

Structured walkthrough

E.

Simulation

Buy Now
Exam Code: 156-110
Exam Name: Check Point Certified Security Principles Associate (CCSPA)
Last Update: May 10, 2024
Questions: 0

PDF + Testing Engine

$850

Testing Engine

$95

PDF (Q&A)

$80