Download Check Point Certified Security Principles Associate (CCSPA).156-110.RealTests.2020-01-15.60q.vcex

Vendor: Checkpoint
Exam Code: 156-110
Exam Name: Check Point Certified Security Principles Associate (CCSPA)
Date: Jan 15, 2020
File Size: 32 KB
Downloads: 1

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
Which of the following equations results in the Single Loss Expectancy for an asset?
  1. Asset Value x % Of Loss From Realized Exposure
  2. Asset Value x % Of Loss From Realized Threat
  3. Annualized Rate of Occurrence / Annualized Loss Expectancy
  4. Asset Value x % Of Loss From Realized Vulnerability
  5. Annualized Rate of Occurrence x Annualized Loss Expectancy
Correct answer: B
Question 2
Which of the following is an integrity requirement for Remote Offices/Branch Offices (ROBOs)?
  1. Private data must remain internal to an organization.
  2. Data must be consistent between ROBO sites and headquarters.
  3. Users must be educated about appropriate security policies.
  4. Improvised solutions must provide the level of protection required.
  5. Data must remain available to all remote offices.
Correct answer: B
Question 3
Operating-svstem fingerprinting uses all of the following, EXCEPT ______, to identify a target operating system.
  1. Sequence Verifier
  2. Initial sequence number
  3. Address spoofing
  4. Time to Live
  5. IP ID field
Correct answer: C
Question 4
Internal intrusions are loosely divided into which categories? (Choose TWO.)
  1. Attempts by insiders to perform appropriate acts, on information assets to which they have been given rights or permissions.
  2. Attempts by insiders to access resources, without proper access rights
  3. Attempts by insiders to access external resources, without proper access rights.
  4. Attempts by insiders to perform inappropriate acts, on external information assets to which they have been given rights or permissions.
  5. Attempts by insiders to perform inappropriate acts, on information assets to which they have been given rights or permissions.
Correct answer: BE
Question 5
Which encryption algorithm has the highest bit strength?
  1. AES
  2. Blowfish
  3. DES
  4. CAST
  5. Triple DES
Correct answer: A
Question 6
Which type of Business Continuity Plan (BCP) test involves shutting down z on-line, and moving all operations to the alternate site?
  1. Parallel
  2. Full interruption
  3. Checklist
  4. Structured walkthrough
  5. Simulation
Correct answer: B
Question 7
Which of the following is NOT an auditing function that should be performed regularly?
  1. Reviewing IDS alerts
  2. Reviewing performance logs
  3. Reviewing IDS logs
  4. Reviewing audit logs
  5. Reviewing system logs
Correct answer: B
Question 8
Which TWO of the following items should be accomplished, when interviewing candidates for a position within an organization?
  1. Hire an investigation agency to run background checks.
  2. Verify all dates of previous employment.
  3. question candidates, using polygraphs, n
  4. Contact personal and professional references.
  5. Run criminal-background checks.
Correct answer: BD
Question 9
Which of these metrics measure how a biometric device performs, when attempting to authenticate subjects? (Choose THREE.)
  1. False Rejection Rate
  2. User Acceptance Rate
  3. Crossover Error Rate
  4. False Acceptance Rate
  5. Enrollment Failure Rate
Correct answer: ACD
Question 10
A new U.S. Federal Information Processing Standard specifies a cryptographic algorithm. This algorithm is used by U.S. government organizations to protect sensitive, but unclassified, information. What is the name of this Standard?
  1. Triple DES
  2. Blowfish
  3. AES
  4. CAST
  5. RSA
Correct answer: C
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!