Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

156-110 Check Point Certified Security Principles Associate (CCSPA) Questions and Answers

Questions 4

You are preparing a machine that will be used as a dedicated Web server. Which of the following services should NOT be removed?

Options:

A.

E. IRC

B.

SMTP

C.

FTP

D.

HTTP

E.

PVP

Buy Now
Questions 5

You are a system administrator for a pool of Web servers. The vendor who sells your Web server posts a patch and sample exploit for a newly discovered vulnerability. You will take all of the actions listed below. Which of the following actions should you take first?

Options:

A.

Run the sample exploit against a test server.

B.

Run the sample exploit against a production server.

C.

Apply the patch to all production servers.

D.

Test the patch on a production server.

E.

Test the patch on a non-production server.

Buy Now
Questions 6

Embedding symbols in images or common items, such as pictures or quilts, is an example of __________.

Options:

A.

Espionage

B.

Transposition cipher

C.

Key exchange

D.

Arithmancy

E.

Steganography

Buy Now
Questions 7

Which of the following is a cost-effective solution for securely transmitting data between remote offices?

Options:

A.

Standard e-mail

B.

Fax machine

C.

Virtual private network

D.

Bonded courier

E.

Telephone

Buy Now
Questions 8

_______ involves gathering pieces of information and drawing a conclusion, whose sensitivity exceeds any of the individual pieces of information.

Options:

A.

Inference

B.

Social engineering

C.

Movement analysis

D.

Communication-pattern analysis

E.

Aggregation

Buy Now
Questions 9

Why does the (ISC)2 access-control systems and methodology functional domain address both the confidentiality and integrity aspects of the Information Security Triad? Access-control systems and methodologies:

Options:

A.

are required standards in health care and banking.

B.

provide redundant systems and data backups.

C.

control who is allowed to view and modify information.

D.

are academic models not suitable for implementation.

E.

set standards for acceptable media-storage devices.

Buy Now
Questions 10

Which encryption algorithm has the highest bit strength?

Options:

A.

AES

B.

Blowfish

C.

DES

D.

CAST

E.

Triple DES

Buy Now
Questions 11

Which of the following statements about the maintenance and review of information security policies is NOT true?

Options:

A.

The review and maintenance of security policies should be tied to the performance evaluations of accountable individuals.

B.

Review requirements should be included in the security policies themselves.

C.

When business requirements change, security policies should be reviewed to confirm that policies reflect the new business requirements.

D.

Functional users and information custodians are ultimately responsible for the accuracy and relevance of information security policies.

E.

In the absence of changes to business requirements and processes, information-security policy reviews should be annual.

Buy Now
Questions 12

Which of the following is the MOST important consideration, when developing security- awareness training materials?

Options:

A.

Training material should be accessible and attractive.

B.

Delivery mechanisms should allow easy development of additional materials, to complement core material.

C.

Security-awareness training materials should never contradict an organizational security policy.

D.

Appropriate language should be used to facilitate localization, should training materials require translation.

E.

Written documentation should be archived, in case of disaster.

Buy Now
Questions 13

Which of the following should be included in an enterprise Business Continuity Plan (BCP)? (Choose THREE.)

Options:

A.

Accidental or intentional data deletion

B.

Severe weather disasters

C.

Employee terminations

D.

Employee administrative leave

E.

Minor power outages

Buy Now
Questions 14

How do virtual corporations maintain confidentiality?

Options:

A.

Encryption

B.

Checksum

C.

Data hashes

D.

Redundant servers

E.

Security by obscurity

Buy Now
Questions 15

Organizations _______ risk, when they convince another entity to assume the risk for them.

Options:

A.

Elevate

B.

Assume

C.

Deny

D.

Transfer

E.

Mitigate

Buy Now
Exam Code: 156-110
Exam Name: Check Point Certified Security Principles Associate (CCSPA)
Last Update: Dec 3, 2024
Questions: 0
156-110 pdf

156-110 PDF

$29.75  $84.99
156-110 Engine

156-110 Testing Engine

$35  $99.99
156-110 PDF + Engine

156-110 PDF + Testing Engine

$297.5  $850