Exam Details

  • Exam Code
    :156-110
  • Exam Name
    :Check Point Certified Security Principles Associate (CCSPA)
  • Certification
    :CheckPoint Certification
  • Vendor
    :CheckPoint
  • Total Questions
    :100 Q&As
  • Last Updated
    :May 15, 2024

CheckPoint CheckPoint Certification 156-110 Questions & Answers

  • Question 21:

    Internal intrusions are loosely divided into which categories? (Choose TWO.)

    A. Attempts by insiders to perform appropriate acts, on information assets to which they have been given rights or permissions.

    B. Attempts by insiders to access resources, without proper access rights.

    C. Attempts by insiders to access external resources, without proper access rights.

    D. Attempts by insiders to perform inappropriate acts, on external information assets to which they have been given rights or permissions.

    E. Attempts by insiders to perform inappropriate acts, on information assets to which they have been given rights or permissions.

  • Question 22:

    What type of document contains information on alternative business locations, IT resources, and personnel?

    A. End-user license agreement

    B. Nondisclosure agreement

    C. Acceptable use policy

    D. Security policy

    E. Business continuity plan

  • Question 23:

    A(n) ______________________________ is a quantitative review of risks, to determine how an organization will continue to function, in the event a risk is realized.

    A. Monitored risk process

    B. Disaster-recovery plan

    C. Business impact analysis

    D. Full interruption test

    E. Information security audit

  • Question 24:

    Which of the following statements about encryption's benefits is false? Encryption can: (Choose TWO.)

    A. significantly reduce the chance information will be modified by unauthorized entities.

    B. only be used to protect data in transit. Encryption provides no protection to stored data.

    C. allow private information to be sent over public networks, in relative safety.

    D. significantly reduce the chance information will be viewed by unauthorized entities.

    E. prevent information from being destroyed by malicious entities, while in transit.

  • Question 25:

    Which principle of secure design states that a security mechanism's methods must be testable?

    A. Separation of privilege

    B. Least common mechanism

    C. Complete mediation

    D. Open design

    E. Economy of mechanism

  • Question 26:

    A new U.S. Federal Information Processing Standard specifies a cryptographic algorithm. This algorithm is

    used by U.S. government organizations to protect sensitive, but unclassified, information.

    What is the name of this Standard?

    A. Triple DES

    B. Blowfish

    C. AES

    D. CAST

    E. RSA

  • Question 27:

    If a firewall receives traffic not explicitly permitted by its security policy, what should the firewall do?

    A. Nothing

    B. Do not log and drop the traffic.

    C. Log and drop the traffic.

    D. Log and pass the traffic.

    E. Do not log and pass the traffic.

  • Question 28:

    Which of the following are enterprise administrative controls? (Choose TWO.)

    A. Network access control

    B. Facility access control

    C. Password authentication

    D. Background checks

    E. Employee handbooks

  • Question 29:

    You are preparing a machine that will be used as a dedicated Web server. Which of the following services should NOT be removed?

    A. E. IRC

    B. SMTP

    C. FTP

    D. HTTP

    E. PVP

  • Question 30:

    How is bogus information disseminated?

    A. Adversaries sort through trash to find information.

    B. Adversaries use anomalous traffic patterns as indicators of unusual activity. They will employ other methods, such as social engineering, to discover the cause of the noise.

    C. Adversaries use movement patterns as indicators of activity.

    D. Adversaries take advantage of a person's trust and goodwill.

    E. Seemingly, unimportant pieces of data may yield enough information to an adversary, for him to disseminate incorrect information and sound authoritative.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CheckPoint exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 156-110 exam preparations and CheckPoint certification application, do not hesitate to visit our Vcedump.com to find your solutions here.