Certbus > CheckPoint > Checkpoint Certifications > 156-110 > 156-110 Online Practice Questions and Answers

156-110 Online Practice Questions and Answers

Questions 4

INFOSEC professionals are concerned about providing due care and due diligence. With whom should they consult, when protecting information assets?

A. Law enforcement in their region

B. Senior management, particularly business-unit owners

C. IETF enforcement officials

D. Other INFOSEC professionals

E. Their organizations' legal experts

Browse 100 Q&As
Questions 5

_______ is the process of confirming that implemented security safeguards work as expected.

A. Penetration testing

B. Exploitation

C. Baselining

D. A vulnerability

E. A countermeasure

Browse 100 Q&As
Questions 6

What must system administrators do when they cannot access a complete replica of their production environment for testing?

A. Extrapolate results from a limited subset.

B. Eliminate the testing phase of change control.

C. Request additional hardware and software.

D. Refuse to implement change requests.

E. Deploy directly to the production environment.

Browse 100 Q&As
Questions 7

A(n) _______ occurs when intrusion-detection measures fail to recognize suspicious traffic or activity.

A. False positive

B. False negative

C. CIFS pop-up

D. Threshold

E. Alarm

Browse 100 Q&As
Questions 8

What is single sign-on? An authentication method:

A. that allows users to authenticate once, and then uses tokens or other credentials to manage subsequent authentication attempts

B. that stores user credentials locally, so that users need only authenticate the first time, a local machine is used

C. requiring the use of one-time passwords, so users authenticate only once, with a given set of credentials.

D. that uses smart cards, hardware tokens, and biometrics to authenticate users; also known as three-factor authentication

E. that requires users to re-authenticate for every resource accessed

Browse 100 Q&As
Questions 9

A new U.S. Federal Information Processing Standard specifies a cryptographic algorithm. This algorithm is

used by U.S. government organizations to protect sensitive, but unclassified, information.

What is the name of this Standard?

A. Triple DES

B. Blowfish

C. AES

D. CAST

E. RSA

Browse 100 Q&As
Questions 10

Which type of Business Continuity Plan (BCP) test involves shutting down a primary site, bringing an alternate site on-line, and moving all operations to the alternate site?

A. Parallel

B. Full interruption

C. Checklist

D. Structured walkthrough

E. Simulation

Browse 100 Q&As
Questions 11

_________________ is a type of cryptography, where letters of an original message are systematically rearranged into another sequence.

A. Symmetric-key exchange

B. Steganography

C. Transposition cipher

D. Asymmetric-key encryption

E. Simple substitution cipher

Browse 100 Q&As
Exam Code: 156-110
Exam Name: Check Point Certified Security Principles Associate (CCSPA)
Last Update: Mar 17, 2025
Questions: 100 Q&As

PDF

$49.99

VCE

$55.99

PDF + VCE

$65.99