Certbus > CheckPoint > CheckPoint Certification > 156-110 > 156-110 Online Practice Questions and Answers

156-110 Online Practice Questions and Answers

Questions 4

_______ involves gathering pieces of information and drawing a conclusion, whose sensitivity exceeds any of the individual pieces of information.

A. Inference

B. Social engineering

C. Movement analysis

D. Communication-pattern analysis

E. Aggregation

Browse 100 Q&As
Questions 5

A _______ _______ posture provides many levels of security possibilities, for access control.

A. Layered defensive

B. Multiple offensive

C. Flat defensive

D. Reactive defensive

E. Proactive offensive

Browse 100 Q&As
Questions 6

At ABC Corporation, access to critical information resources, such as database and e-mail servers, is controlled by the information-technology (IT) department. The supervisor in the department grants access to printers where the printer is located. Managers grant and revoke rights to files within their departments' directories on the file server, but the IT department controls who has access to the directories. Which type of access-management system is in use at ABC Corporation?

A. Centralized access management

B. Role-based access management

C. Hybrid access management

D. Decentralized access management

E. Privileged access management

Browse 100 Q&As
Questions 7

Which of the following is NOT a Business Continuity Plan (BCP) recovery strategy?

A. Delegating risk to another entity, such as an insurer

B. Manual procedures; alternative solution to technology available

C. Deferring action; action waiting until a later date

D. Reciprocal agreements with another organization

E. Doing nothing; no action taken to recover the technology

Browse 100 Q&As
Questions 8

A(n) _______________ is an unintended communication path that can be used to violate a system security policy.

A. Covert channel

B. Integrity axiom

C. Simple rule violation

D. Inferred fact

E. Aggregated data set

Browse 100 Q&As
Questions 9

Which of the following is likely in a small-business environment?

A. Most small businesses employ a full-time information-technology staff.

B. Resources are available as needed.

C. Small businesses have security personnel on staff.

D. Most employees have experience with information security.

E. Security budgets are very small.

Browse 100 Q&As
Questions 10

Which of the following best describes an external intrusion attempt on a local-area network (LAN)?

A. Internal users try to gain unauthorized access to information assets outside the organizational perimeter.

B. External-intrusion attempts from sources outside the LAN are not granted permissions or rights to an organization's information assets.

C. External users attempt to access public resources.

D. External intruders attempt exploitation of vulnerabilities, to remove their own access.

E. Internal users perform inappropriate acts on assets to which they have been given rights or permissions.

Browse 100 Q&As
Questions 11

Which of the following are appropriate uses of asymmetric encryption? (Choose THREE.)

A. Authentication

B. Secure key-exchange mechanisms

C. Public Web site access

D. Data-integrity checking

E. Sneaker net

Browse 100 Q&As
Exam Code: 156-110
Exam Name: Check Point Certified Security Principles Associate (CCSPA)
Last Update: Apr 23, 2024
Questions: 100 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99