Summer Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

Checkpoint 156-110 Check Point Certified Security Principles Associate (CCSPA) Exam Practice Test

Demo: 15 questions
Total 100 questions

Check Point Certified Security Principles Associate (CCSPA) Questions and Answers

Question 1

_______ is a method of tricking users into revealing passwords, or other sensitive information.

Options:

A.

Dumpster diving

B.

Means testing

C.

Social engineering

D.

Risk

E.

Exposure

Question 2

You are preparing a machine that will be used as a dedicated Web server. Which of the following services should NOT be removed?

Options:

A.

E. IRC

B.

SMTP

C.

FTP

D.

HTTP

E.

PVP

Question 3

Which principle of secure design states that a security mechanism's methods must be testable?

Options:

A.

Separation of privilege

B.

Least common mechanism

C.

Complete mediation

D.

Open design

E.

Economy of mechanism

Question 4

_________ is a smaller, enhanced version of the X.500 protocol. It is used to provide directory-service information. (Choose the BEST answer.)

Options:

A.

Lightweight Directory Access Protocol

B.

X.400 Directory Access Protocol

C.

Access control list

D.

Lightweight Host Configuration Protocol

E.

Role-based access control

Question 5

Which of the following are enterprise administrative controls? (Choose TWO.)

Options:

A.

Network access control

B.

Facility access control

C.

Password authentication

D.

Background checks

E.

Employee handbooks

Question 6

A(n) ________________ is a one-way mathematical function that maps variable values into smaller values of a fixed length.

Options:

A.

Symmetric key

B.

Algorithm

C.

Back door

D.

Hash function

E.

Integrity

Question 7

Why should the number of services on a server be limited to required services?

Options:

A.

Every open service represents a potential vulnerability.

B.

Closed systems require special connectivity services.

C.

Running extra services makes machines more efficient.

D.

All services are inherently stable and secure.

E.

Additional services make machines more secure.

Question 8

____________________ is the state of being correct, or the degree of certainty a person or process can have, that the data in an information asset is correct.

Options:

A.

Confidentiality

B.

Integrity

C.

Authenticity

D.

Privacy

E.

Availability

Question 9

Which of the following should be included in an enterprise Business Continuity Plan (BCP)? (Choose THREE.)

Options:

A.

Accidental or intentional data deletion

B.

Severe weather disasters

C.

Employee terminations

D.

Employee administrative leave

E.

Minor power outages

Question 10

How is bogus information disseminated?

Options:

A.

Adversaries sort through trash to find information.

B.

Adversaries use anomalous traffic patterns as indicators of unusual activity. They will employ other methods, such as social engineering, to discover the cause of the noise.

C.

Adversaries use movement patterns as indicators of activity.

D.

Adversaries take advantage of a person's trust and goodwill.

E.

Seemingly, unimportant pieces of data may yield enough information to an adversary, for him to disseminate incorrect information and sound authoritative.

Question 11

To protect its information assets, ABC Company purchases a safeguard that costs $60,000. The annual cost to maintain the safeguard is estimated to be $40,000. The aggregate Annualized Loss Expectancy for the risks the safeguard is expected to mitigate is $50,000.

At this rate of return, how long will it take ABC Company to recoup the cost of the safeguard?

Options:

A.

ABC Company will never recoup the cost of this safeguard.

B.

Less than 7 years

C.

Less than 3 years

D.

Less than 1 year

E.

Less than 5 years

Question 12

Internal intrusions are loosely divided into which categories? (Choose TWO.)

Options:

A.

Attempts by insiders to perform appropriate acts, on information assets to which they have been given rights or permissions.

B.

Attempts by insiders to access resources, without proper access rights.

C.

Attempts by insiders to access external resources, without proper access rights.

D.

Attempts by insiders to perform inappropriate acts, on external information assets to which they have been given rights or permissions.

E.

Attempts by insiders to perform inappropriate acts, on information assets to which they have been given rights or permissions.

Question 13

A(n) _______ occurs when intrusion-detection measures fail to recognize suspicious traffic or activity.

Options:

A.

False positive

B.

False negative

C.

CIFS pop-up

D.

Threshold

E.

Alarm

Question 14

Which of the following best describes the largest security challenge for Remote Offices/Branch Offices?

Options:

A.

Leased-line security

B.

Salami attacks

C.

Unauthorized network connectivity

D.

Distributed denial-of-service attacks

E.

Secure access to remote organizational resources

Question 15

Who should have physical access to network-connectivity devices and corporate servers?

Options:

A.

Customers and clients

B.

Accounting, information-technology, and auditing staff

C.

Managers and C-level executives

D.

Only appropriate information-technology personnel

E.

Only the maintenance staff

Demo: 15 questions
Total 100 questions