Exam Code : 156-110
Exam Name : Check Point Certified Security Principles Associate
Vendor Name :
"CheckPoint"
156-110 Dumps
156-110 Braindumps
156-110 Real Questions
156-110 Practice Test
156-110 Actual Questions
killexams.com CheckPoint 156-110
Check Point Certified Security Principles Associate
https://killexams.com/pass4sure/exam-detail/156-110
is a method of tricking users into revealing passwords, or other sensitive information.
Dumpster diving
Means testing
Social engineering
Risk
Exposure
Which of the following equations results in the Single Loss Expectancy for an asset?
Asset Value x % Of Loss From Realized Exposure
Asset Value x % Of Loss From Realized Threat
Annualized Rate of Occurrence / Annualized Loss Expectancy
Asset Value x % Of Loss From Realized Vulnerability
Annualized Rate of Occurrence x Annualized Loss Expectancy
Which encryption algorithm has the highest bit strength?
AES
Blowfish
DES
CAST
Triple DES
is a type of cryptography, where letters of an original message are
systematically rearranged into another sequence.
Symmetric-key exchange
Steganography
Transposition cipher
Asymmetric-key encryption
Simple substitution cipher
Which of the following are appropriate uses of asymmetric encryption? (Choose THREE.)
Authentication
Secure key-exchange mechanisms
Public Web site access
Data-integrity checking
Sneaker net
What is the purpose of resource isolation?
To reduce the level of broadcast traffic on physical segments.
To ensure that anyone accessing a resource has appropriate integrity.
To automate the creation of access control lists and Trusted Computing Bases.
To enforce access controls, and clearly separate resources from each other.
To make people buy more computers than they really need.
Why should user populations be segmented?
To allow resources to be shared among employees
To allow appropriate collaboration, and prevent inappropriate resource sharing
To prevent appropriate collaboration
To provide authentication services
To prevent the generation of audit trails from gateway devices
A(n) is an abstract machine, which mediates all access subjects have to objects.
ACL
Reference monitor
State machine
TCB
Router
Who should have physical access to network-connectivity devices and corporate servers?
Customers and clients
Accounting, information-technology, and auditing staff
Managers and C-level executives
Only appropriate information-technology personnel
Only the maintenance staff
Which of the following represents a valid reason for testing a patch on a nonproduction
system, before applying it to a production system?
Patches may re-enable services previously disabled.
Patches are a kind of virus.
Patches always overwrite user data.
Only patches on vendor-pressed CDs can be trusted.
Patches usually break important system functionality.