Free Download Pass4sure Check Point CCSPA 156-110 Exam Questions

Check Point Certified Security Principles Associate (CCSPA): 156-110 Exam
156-110 Questions & Answers
Exam Code: 156-110
Exam Name: Check Point Certified Security Principles Associate (CCSPA)
Q & A: 112 Q&As

Part: A
1: A(n) ________________ is a one-way mathematical function that maps variable values into
smaller values of a fixed length.
A.Symmetric key
B.Algorithm
C.Back door
D.Hash function
E.Integrity
Correct Answers: D

2: INFOSEC professionals are concerned about providing due care and due diligence. With whom
should they consult, when protecting information assets?
A.Law enforcement in their region
B.Senior management, particularly business-unit owners
C.IETF enforcement officials
D.Other INFOSEC professionals
E.Their organizations’ legal experts
Correct Answers: E

3: How do virtual corporations maintain confidentiality?
A.Encryption
B.Checksum
C.Data hashes
D.Redundant servers
E.Security by obscurity
Correct Answers: A

4: All of the following are possible configurations for a corporate intranet, EXCEPT:
A.Value-added network
B.Wide-area network
C.Campus-area network
D.Metropolitan-area network
E.Local-area network
Correct Answers: A

5: Which of the following is NOT an auditing function that should be performed regularly?
A.Reviewing IDS alerts
B.Reviewing performance logs
C.Reviewing IDS logs
D.Reviewing audit logs
E.Reviewing system logs
Correct Answers: B

6: The items listed below are examples of ___________________ controls.
*Procedures and policies
*Employee security-awareness training
*Employee background checks
*Increasing management security awareness
A.Technical
B.Administrative
C.Role-based
D.Mandatory
E.Physical
Correct Answers: B

7: Digital signatures are typically provided by a ____________________, where a third party
verifies a key’s authenticity.
A.Network firewall
B.Security administrator
C.Domain controller
D.Certificate Authority
E.Hash function
Correct Answers: D

8: Which of the following is MOST likely to cause management to view a security-needs proposal
as invalid?
A.Real-world examples
B.Exaggeration
C.Ranked threats
D.Quantified risks
E.Temperate manner
Correct Answers: B

9: What is mandatory sign-on? An authentication method that:
A.uses smart cards, hardware tokens, and biometrics to authenticate users; also known as
three-factor authentication
B.requires the use of one-time passwords, so users authenticate only once, with a given set of
credentials
C.requires users to re-authenticate at each server and access control
D.stores user credentials locally, so that users need only authenticate the first time a local machine
is used
E.allows users to authenticate once, and then uses tokens or other credentials to manage
subsequent authentication attempts
Correct Answers: C

10: One individual is selected from each department, to attend a security-awareness course. Each
person returns to his department, delivering the course to the remainder of the department. After training is complete, each person acts as a peer coach. Which type of training is this?
A.On-line training
B.Formal classroom training
C.Train-the-mentor training
D.Alternating-facilitator training
E.Self-paced training
Correct Answers: C

11: Which of the following is a cost-effective solution for securely transmitting data between
remote offices?
A.Standard e-mail
B.Fax machine
C.Virtual private network
D.Bonded courier
E.Telephone
Correct Answers: C

12: Which of the following statements about the maintenance and review of information security
policies is NOT true?
A.The review and maintenance of security policies should be tied to the performance evaluations
of accountable individuals.
B.Review requirements should be included in the security policies themselves.
C.When business requirements change, security policies should be reviewed to confirm that
policies reflect the new business requirements.
D.Functional users and information custodians are ultimately responsible for the accuracy and
relevance of information security policies.
E.In the absence of changes to business requirements and processes, information-security policy
reviews should be annual.
Correct Answers: D

13: Which of the following tests provides testing teams some information about hosts or
networks?
A.Partial-knowledge test
B.Full-knowledge test
C.Zero-knowledge test
Correct Answers: A

14: _______ can mimic the symptoms of a denial-of-service attack, and the resulting loss in
productivity can be no less devastating to an organization.
A.ICMP traffic
B.Peak traffic
C.Fragmented packets
D.Insufficient bandwidth
E.Burst traffic
Correct Answers: D

15: Which of the following is the MOST important consideration, when developing security-
awareness training materials?
A.Training material should be accessible and attractive.
B.Delivery mechanisms should allow easy development of additional materials, to complement
core material.
C.Security-awareness training materials should never contradict an organizational security policy.
D.Appropriate language should be used to facilitate localization, should training materials require
translation.
E.Written documentation should be archived, in case of disaster.
Correct Answers: C

16: To comply with the secure design principle of fail-safe defaults, what must a system do if it
receives an instruction it does not understand? The system should:
A.send the instruction to a peer server, to see if the peer can execute.
B.not attempt to execute the instruction.
C.close the connection, and refuse all further traffic from the originator.
D.not launch its debugging features, and attempt to resolve the instruction.
E.search for a close match in the instruction set it understands.
Correct Answers: B

17: Which of these metrics measure how a biometric device performs, when attempting to
authenticate subjects? (Choose THREE.)
A.False Rejection Rate
B.User Acceptance Rate
C.Crossover Error Rate
D.False Acceptance Rate
E.Enrollment Failure Rate
Correct Answers: A C D

18: Why should the number of services on a server be limited to required services?
A.Every open service represents a potential vulnerability.
B.Closed systems require special connectivity services.
C.Running extra services makes machines more efficient.
D.All services are inherently stable and secure.
E.Additional services make machines more secure.
Correct Answers: A

19: _______ intrusion detection involves comparing traffic to known characteristics of malicious
traffic, known as attack signatures.
A.Pattern matching
B.Statistical anomaly
C.Behavioral analysis D.Host
E.Network
Correct Answers: A

20: Which of the following calculations is used when selecting countermeasures?
A.Annualized Rate of Occurrence
B.Single Loss Expectancy
C.Annualized Loss Expectancy
D.Business Impact Analysis
E.Business Continuity Plan
Correct Answers: C

…go to http://www.lead2pass.com/156-110.html to download the full version Q&As.