Pass the Checkpoint Checkpoint Other Certification 156-110 Questions and answers with CertsForce

Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions
Questions # 21:

Which of the following are enterprise administrative controls? (Choose TWO.)

Options:

A.

Network access control


B.

Facility access control


C.

Password authentication


D.

Background checks


E.

Employee handbooks


Expert Solution
Questions # 22:

Which type of Business Continuity Plan (BCP) test involves practicing aspects of the BCP, without actually interrupting operations or bringing an alternate site on-line?

Options:

A.

Structured walkthrough


B.

Checklist


C.

Simulation


D.

Full interruption


E.

Parallel


Expert Solution
Questions # 23:

_________ is a smaller, enhanced version of the X.500 protocol. It is used to provide directory-service information. (Choose the BEST answer.)

Options:

A.

Lightweight Directory Access Protocol


B.

X.400 Directory Access Protocol


C.

Access control list


D.

Lightweight Host Configuration Protocol


E.

Role-based access control


Expert Solution
Questions # 24:

_______ intrusion detection involves comparing traffic to known characteristics of malicious traffic, known as attack signatures.

Options:

A.

Pattern matching


B.

Statistical anomaly


C.

Behavioral analysis


D.

Host


E.

Network


Expert Solution
Questions # 25:

You are considering purchasing a VPN solution to protect your organization's information assets. The solution you are reviewing uses RFC-compliant and open-standards encryption schemes. The vendor has submitted the system to a variety of recognized testing authorities. The vendor does not make the source code available to testing authorities. Does this solution adhere to the secure design principle of open design?

Options:

A.

No, because the software vendor could have changed the code after testing, which is not verifiable.


B.

No, because the software vendor submitted the software to testing authorities only, and did not make the software available to the public for testing.


C.

Yes, because the methods were tested by recognized testing authorities, and the source code is protected from vandalism.


D.

Yes, because the methods are open, and the system does not rely on the secrecy of its internal mechanisms to provide protection.


E.

No, because if a software vendor refuses to reveal the source code for a product, it cannot comply with the open-design principle.


Expert Solution
Questions # 26:

Digital signatures are typically provided by a ____________________, where a third party verifies a key's authenticity.

Options:

A.

Network firewall


B.

Security administrator


C.

Domain controller


D.

Certificate Authority


E.

Hash function


Expert Solution
Questions # 27:

Which TWO of the following items should be accomplished, when interviewing candidates for a position within an organization?

Options:

A.

Hire an investigation agency to run background checks.


B.

Verify all dates of previous employment.


C.

Question candidates, using polygraphs.


D.

Contact personal and professional references.


E.

Run criminal-background checks.


Expert Solution
Questions # 28:

Which principle of secure design states that a security mechanism's methods must be testable?

Options:

A.

Separation of privilege


B.

Least common mechanism


C.

Complete mediation


D.

Open design


E.

Economy of mechanism


Expert Solution
Questions # 29:

Why does the (ISC)2 access-control systems and methodology functional domain address both the confidentiality and integrity aspects of the Information Security Triad? Access-control systems and methodologies:

Options:

A.

are required standards in health care and banking.


B.

provide redundant systems and data backups.


C.

control who is allowed to view and modify information.


D.

are academic models not suitable for implementation.


E.

set standards for acceptable media-storage devices.


Expert Solution
Questions # 30:

____________________ educate(s) security administrators and end users about organizations' security policies.

Options:

A.

Security-awareness training


B.

Information Security (INFOSEC) briefings


C.

Acceptable-use policies


D.

Continuing education


E.

Nondisclosure agreements


Expert Solution
Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions