Download Checkpoint.156-110.RealTests.2020-01-15.60q.vcex

Download Exam

File Info

Exam Check Point Certified Security Principles Associate (CCSPA)
Number 156-110
File Name Checkpoint.156-110.RealTests.2020-01-15.60q.vcex
Size 32 KB
Posted Jan 15, 2020
Download Checkpoint.156-110.RealTests.2020-01-15.60q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.


With discount: 20%

Demo Questions

Question 1

Which of the following equations results in the Single Loss Expectancy for an asset?

  1. Asset Value x % Of Loss From Realized Exposure
  2. Asset Value x % Of Loss From Realized Threat
  3. Annualized Rate of Occurrence / Annualized Loss Expectancy
  4. Asset Value x % Of Loss From Realized Vulnerability
  5. Annualized Rate of Occurrence x Annualized Loss Expectancy
Correct answer: B

Question 2

Which of the following is an integrity requirement for Remote Offices/Branch Offices (ROBOs)?

  1. Private data must remain internal to an organization.
  2. Data must be consistent between ROBO sites and headquarters.
  3. Users must be educated about appropriate security policies.
  4. Improvised solutions must provide the level of protection required.
  5. Data must remain available to all remote offices.
Correct answer: B

Question 3

Operating-svstem fingerprinting uses all of the following, EXCEPT ______, to identify a target operating system.

  1. Sequence Verifier
  2. Initial sequence number
  3. Address spoofing
  4. Time to Live
  5. IP ID field
Correct answer: C

Question 4

Internal intrusions are loosely divided into which categories? (Choose TWO.)

  1. Attempts by insiders to perform appropriate acts, on information assets to which they have been given rights or permissions.
  2. Attempts by insiders to access resources, without proper access rights
  3. Attempts by insiders to access external resources, without proper access rights.
  4. Attempts by insiders to perform inappropriate acts, on external information assets to which they have been given rights or permissions.
  5. Attempts by insiders to perform inappropriate acts, on information assets to which they have been given rights or permissions.
Correct answer: BE

Question 5

Which encryption algorithm has the highest bit strength?

  1. AES
  2. Blowfish
  3. DES
  4. CAST
  5. Triple DES
Correct answer: A

Question 6

Which type of Business Continuity Plan (BCP) test involves shutting down z on-line, and moving all operations to the alternate site?

  1. Parallel
  2. Full interruption
  3. Checklist
  4. Structured walkthrough
  5. Simulation
Correct answer: B

Question 7

Which of the following is NOT an auditing function that should be performed regularly?

  1. Reviewing IDS alerts
  2. Reviewing performance logs
  3. Reviewing IDS logs
  4. Reviewing audit logs
  5. Reviewing system logs
Correct answer: B

Question 8

Which TWO of the following items should be accomplished, when interviewing candidates for a position within an organization?

  1. Hire an investigation agency to run background checks.
  2. Verify all dates of previous employment.
  3. question candidates, using polygraphs, n
  4. Contact personal and professional references.
  5. Run criminal-background checks.
Correct answer: BD

Question 9

Which of these metrics measure how a biometric device performs, when attempting to authenticate subjects? (Choose THREE.)

  1. False Rejection Rate
  2. User Acceptance Rate
  3. Crossover Error Rate
  4. False Acceptance Rate
  5. Enrollment Failure Rate
Correct answer: ACD

Question 10

A new U.S. Federal Information Processing Standard specifies a cryptographic algorithm. This algorithm is used by U.S. government organizations to protect sensitive, but unclassified, information. What is the name of this Standard?

  1. Triple DES
  2. Blowfish
  3. AES
  4. CAST
  5. RSA
Correct answer: C





You can buy ProfExam with a 20% discount!


Use ProfExam Simulator to open VCEX files