Black Friday Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

156-110 Check Point Certified Security Principles Associate (CCSPA) Questions and Answers

Questions 4

Which of these strategies can be employed to test training effectiveness? (Choose THREE.)

Options:

A.

Create a survey for managers, to see if participants practice behaviors presented during training.

B.

Provide feedback forms for employees to rate instruction and training material, immediately after training has ended.

C.

Include auditors before and after the training. This checks to see if the number of security-related incidents is reduced, because of the training.

D.

Give incentives to employees who attend security-awareness training. Perform spot-checks, to see if incentives are displayed.

E.

Test employees on security concepts several months after training has ended.

Buy Now
Questions 5

_________________ is the process of subjects establishing who they are to an access control.

Options:

A.

Identification

B.

Authentication

C.

Authorization

D.

Validation

E.

Biometrics

Buy Now
Questions 6

ABC Corporation's network requires users to authenticate to cross the border firewall, and before entering restricted segments. Servers containing sensitive information require separate authentication. This is an example of which type of access-control method?

Options:

A.

Single sign-on

B.

Decentralized access control

C.

Hybrid access control

D.

Layered access control

E.

Mandatory access control

Buy Now
Questions 7

Which of the following is MOST likely to cause management to view a security-needs proposal as invalid?

Options:

A.

Real-world examples

B.

Exaggeration

C.

Ranked threats

D.

Quantified risks

E.

Temperate manner

Buy Now
Questions 8

Which of the following is an integrity requirement for Remote Offices/Branch Offices (ROBOs)?

Options:

A.

Private data must remain internal to an organization.

B.

Data must be consistent between ROBO sites and headquarters.

C.

Users must be educated about appropriate security policies.

D.

Improvised solutions must provide the level of protection required.

E.

Data must remain available to all remote offices.

Buy Now
Questions 9

Digital signatures are typically provided by a ____________________, where a third party verifies a key's authenticity.

Options:

A.

Network firewall

B.

Security administrator

C.

Domain controller

D.

Certificate Authority

E.

Hash function

Buy Now
Questions 10

What must system administrators do when they cannot access a complete replica of their production environment for testing?

Options:

A.

Extrapolate results from a limited subset.

B.

Eliminate the testing phase of change control.

C.

Request additional hardware and software.

D.

Refuse to implement change requests.

E.

Deploy directly to the production environment.

Buy Now
Questions 11

Which of the following are appropriate uses of asymmetric encryption? (Choose THREE.)

Options:

A.

Authentication

B.

Secure key-exchange mechanisms

C.

Public Web site access

D.

Data-integrity checking

E.

Sneaker net

Buy Now
Questions 12

Which of the following statements about encryption's benefits is false? Encryption can: (Choose TWO.)

Options:

A.

significantly reduce the chance information will be modified by unauthorized entities.

B.

only be used to protect data in transit. Encryption provides no protection to stored data.

C.

allow private information to be sent over public networks, in relative safety.

D.

significantly reduce the chance information will be viewed by unauthorized entities.

E.

prevent information from being destroyed by malicious entities, while in transit.

Buy Now
Questions 13

A(n) _______________ is an unintended communication path that can be used to violate a system security policy.

Options:

A.

Covert channel

B.

Integrity axiom

C.

Simple rule violation

D.

Inferred fact

E.

Aggregated data set

Buy Now
Questions 14

____________________ are the people who consume, manipulate, and produce information assets.

Options:

A.

Information asset owners

B.

Business-unit owners

C.

Audit-control groups

D.

Information custodians

E.

Functional users

Buy Now
Questions 15

Which TWO of the following items should be accomplished, when interviewing candidates for a position within an organization?

Options:

A.

Hire an investigation agency to run background checks.

B.

Verify all dates of previous employment.

C.

Question candidates, using polygraphs.

D.

Contact personal and professional references.

E.

Run criminal-background checks.

Buy Now
Exam Code: 156-110
Exam Name: Check Point Certified Security Principles Associate (CCSPA)
Last Update: Nov 24, 2024
Questions: 0
156-110 pdf

156-110 PDF

$25.5  $84.99
156-110 Engine

156-110 Testing Engine

$30  $99.99
156-110 PDF + Engine

156-110 PDF + Testing Engine

$255  $850