156-110 TestsExpert.com

Page 1

Check Point CODE: 156-110 Exam Name: Check Point Certified Security Principles Associate (CCSPA)

http://www.testsexpert.com/156-110.html

Type

Microsoft

1

IBM

Demo

HP Cisco Oracle Instant download after purchase

http://www.testsexpert.com/156-110.html

Symantec


Question: 1 A(n) ________________ is a one-way mathematical function that maps variable values into smaller values of a fixed length. A. Symmetric key B. Algorithm C. Back door D. Hash function E. Integrity

Answer: D

Question: 2 INFOSEC professionals are concerned about providing due care and due diligence. With whom should they consult, when protecting information assets? A. Law enforcement in their region B. Senior management, particularly business-unit owners C. IETF enforcement officials D. Other INFOSEC professionals E. Their organizations' legal experts

Answer: E

Question: 3 How do virtual corporations maintain confidentiality? A. Encryption B. Checksum C. Data hashes D. Redundant servers E. Security by obscurity

Microsoft

2

IBM

HP Cisco Oracle Instant download after purchase

http://www.testsexpert.com/156-110.html

Symantec


Answer: A

Question: 4 All of the following are possible configurations for a corporate intranet, EXCEPT: A. Value-added network B. Wide-area network C. Campus-area network D. Metropolitan-area network E. Local-area network

Answer: A

Question: 5 Which of the following is NOT an auditing function that should be performed regularly? A. Reviewing IDS alerts B. Reviewing performance logs C. Reviewing IDS logs D. Reviewing audit logs E. Reviewing system logs

Answer: B

Question: 6 The items listed below are examples of ___________________ controls. *Procedures and policies *Employee security-awareness training *Employee background checks *Increasing management security awareness A. Technical B. Administrative C. Role-based D. Mandatory E. Physical

Microsoft

3

IBM

HP Cisco Oracle Instant download after purchase

http://www.testsexpert.com/156-110.html

Symantec


Answer: B

Question: 7 Digital signatures are typically provided by a ____________________, where a third party verifies a key's authenticity. A. Network firewall B. Security administrator C. Domain controller D. Certificate Authority E. Hash function

Answer: D

Question: 8 Which of the following is MOST likely to cause management to view a security-needs proposal as invalid? A. Real-world examples B. Exaggeration C. Ranked threats D. Quantified risks E. Temperate manner

Answer: B

Question: 9 What is mandatory sign-on? An authentication method that: A. uses smart cards, hardware tokens, and biometrics to authenticate users; also known as threefactor authentication B. requires the use of one-time passwords, so users authenticate only once, with a given set of

Microsoft

4

IBM

HP Cisco Oracle Instant download after purchase

http://www.testsexpert.com/156-110.html

Symantec


credentials C. requires users to re-authenticate at each server and access control D. stores user credentials locally, so that users need only authenticate the first time a local machine is used E. allows users to authenticate once, and then uses tokens or other credentials to manage subsequent authentication attempts

Answer: C

Question: 10 One individual is selected from each department, to attend a security-awareness course. Each person returns to his department, delivering the course to the remainder of the department. After training is complete, each person acts as a peer coach. Which type of training is this? A. On-line training B. Formal classroom training C. Train-the-mentor training D. Alternating-facilitator training E. Self-paced training

Answer: C

Microsoft

5

IBM

HP Cisco Oracle Instant download after purchase

http://www.testsexpert.com/156-110.html

Symantec


Check Point CODE: 156-110 Exam Name: Check Point Certified Security Principles Associate (CCSPA)

http://www.testsexpert.com/156-110.html Microsoft

Cisco

IBM

MCTS 70-337

CCNA 640-802 640-822 640-816 640-460

MBS 98-361 70-332

CCNP 642-832 642-813 642-825 642-845

000-G01 000-M44

MCAS 77-602

CCSP 642-627 642-637 642-647 642-545

000-444 000-910

MCSE 70-282

CCIE 350-001 350-018 350-029 350-060

COG-105 COG-185

MCSA 2003 70-461 70-620

DATA CENTER 642-972 642-973 642-974 642-975

70-336 70-462

MB3-861

77-601 77-604 70-281 70-284 70-680

70-463

MB3-862

77-605 70-285

70-291

Microsoft

6

IBM

IBM Lotus

000-M42 000-M60

000-M41 000-M62

IBM Mastery

000-M43 000-M45

Solutions Expert

000-640 000-913

IBM Cognos

COG-180 COG-200

IBM Specialist

000-005 000-032

000-015 000-042

HP

Other

AIS

70-323 9L0-063 9L0-010 9L0-517 HP2-E53 70-321 650-179 1Y0-A20 00M-646 MB2-876 646-206 9L0-314 MB6-884 220-701 650-196 3305 MB6-871 HP2-Z22 9L0-407 9A0-146 HP2-H23 000-184 1Z0-527 HP2-B91 000-781 M70-201 M70-101 7004 HP3-X11 HP3-X08

HP0-311

HP0-M28

HP0-A25

HP0-M30

APC

HP0-D11 HP0-S29

HP0-J37 HP0-P14

MASE HP0-J33 HP0-M48 HP0-M49 HP0-M50 ASE

HP0-066 HP0-781

HP0-082 HP0-782

CSE

HP0-090 HP0-277

HP0-276 HP0-760

HP Cisco Oracle Instant download after purchase

http://www.testsexpert.com/156-110.html

Symantec


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.