Pass the Checkpoint Checkpoint Other Certification 156-110 Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

_______________________________ occurs when an individual or process acquires a higher level of privilege, or access, than originally intended.

Options:

A.

Security Triad


B.

Privilege aggregation


C.

Need-to-know


D.

Privilege escalation


E.

Least privilege


Expert Solution
Questions # 12:

A(n) _______________ is an unintended communication path that can be used to violate a system security policy.

Options:

A.

Covert channel


B.

Integrity axiom


C.

Simple rule violation


D.

Inferred fact


E.

Aggregated data set


Expert Solution
Questions # 13:

Which of the following entities review partner-extranet requirements?

Options:

A.

Information systems


B.

Shipping and receiving


C.

Marketing


D.

Requesting department


E.

Chief Information Officer


Expert Solution
Questions # 14:

A(n) _______ is the first step for determining which technical information assets should be protected.

Options:

A.

Network diagram


B.

Business Impact Analysis


C.

Office floor plan


D.

Firewall


E.

Intrusion detection system


Expert Solution
Questions # 15:

Which of the following are appropriate uses of asymmetric encryption? (Choose THREE.)

Options:

A.

Authentication


B.

Secure key-exchange mechanisms


C.

Public Web site access


D.

Data-integrity checking


E.

Sneaker net


Expert Solution
Questions # 16:

Which encryption algorithm has the highest bit strength?

Options:

A.

AES


B.

Blowfish


C.

DES


D.

CAST


E.

Triple DES


Expert Solution
Questions # 17:

Which of the following is MOST likely to cause management to view a security-needs proposal as invalid?

Options:

A.

Real-world examples


B.

Exaggeration


C.

Ranked threats


D.

Quantified risks


E.

Temperate manner


Expert Solution
Questions # 18:

Which types of security solutions should a home user deploy? (Choose TWO.)

Options:

A.

Managed Security Gateway


B.

Access control lists on a router


C.

Personal firewall


D.

Network intrusion-detection system


E.

Anti-virus software


Expert Solution
Questions # 19:

To protect its information assets, ABC Company purchases a safeguard that costs $60,000. The annual cost to maintain the safeguard is estimated to be $40,000. The aggregate Annualized Loss Expectancy for the risks the safeguard is expected to mitigate is $50,000.

At this rate of return, how long will it take ABC Company to recoup the cost of the safeguard?

Options:

A.

ABC Company will never recoup the cost of this safeguard.


B.

Less than 7 years


C.

Less than 3 years


D.

Less than 1 year


E.

Less than 5 years


Expert Solution
Questions # 20:

Which of the following is a cost-effective solution for securely transmitting data between remote offices?

Options:

A.

Standard e-mail


B.

Fax machine


C.

Virtual private network


D.

Bonded courier


E.

Telephone


Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions