Pass the Checkpoint Checkpoint Other Certification 156-110 Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which of the following calculations is used when selecting countermeasures?

Options:

A.

Annualized Rate of Occurrence


B.

Single Loss Expectancy


C.

Annualized Loss Expectancy


D.

Business Impact Analysis


E.

Business Continuity Plan


Expert Solution
Questions # 2:

When should procedures be evaluated?

Options:

A.

When new functional users join an organization


B.

On the anniversary of the procedures' implementation


C.

Each time procedures are used


D.

Whenever business processes are modified


E.

When new exploits and attacks are discovered


Expert Solution
Questions # 3:

Which of the following statements about the maintenance and review of information security policies is NOT true?

Options:

A.

The review and maintenance of security policies should be tied to the performance evaluations of accountable individuals.


B.

Review requirements should be included in the security policies themselves.


C.

When business requirements change, security policies should be reviewed to confirm that policies reflect the new business requirements.


D.

Functional users and information custodians are ultimately responsible for the accuracy and relevance of information security policies.


E.

In the absence of changes to business requirements and processes, information-security policy reviews should be annual.


Expert Solution
Questions # 4:

Which type of access management allows subjects to control some access of objects for other subjects?

Options:

A.

Discretionary


B.

Hybrid


C.

Mandatory


D.

Role-based


E.

Nondiscretionary


Expert Solution
Questions # 5:

____________________ is the state of being correct, or the degree of certainty a person or process can have, that the data in an information asset is correct.

Options:

A.

Confidentiality


B.

Integrity


C.

Authenticity


D.

Privacy


E.

Availability


Expert Solution
Questions # 6:

All of the following are possible configurations for a corporate intranet, EXCEPT:

Options:

A.

Value-added network


B.

Wide-area network


C.

Campus-area network


D.

Metropolitan-area network


E.

Local-area network


Expert Solution
Questions # 7:

_______ intrusion-detection systems learn the behavior of a machine or network, and create a baseline.

Options:

A.

Behavioral analysis


B.

Statistical anomaly


C.

Network


D.

Pattern matching


E.

Host


Expert Solution
Questions # 8:

_______ can mimic the symptoms of a denial-of-service attack, and the resulting loss in productivity can be no less devastating to an organization.

Options:

A.

ICMP traffic


B.

Peak traffic


C.

Fragmented packets


D.

Insufficient bandwidth


E.

Burst traffic


Expert Solution
Questions # 9:

Which of these metrics measure how a biometric device performs, when attempting to authenticate subjects? (Choose THREE.)

Options:

A.

False Rejection Rate


B.

User Acceptance Rate


C.

Crossover Error Rate


D.

False Acceptance Rate


E.

Enrollment Failure Rate


Expert Solution
Questions # 10:

Why should the number of services on a server be limited to required services?

Options:

A.

Every open service represents a potential vulnerability.


B.

Closed systems require special connectivity services.


C.

Running extra services makes machines more efficient.


D.

All services are inherently stable and secure.


E.

Additional services make machines more secure.


Expert Solution
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions