Exam 1: Check Point Certified Security Principles Associate (CCSPA)
Exam 1: Check Point Certified Security Principles Associate (CCSPA)60 Questions
Exam 2: Check Point Certified Security Administrator (CCSA R80)676 Questions
Exam 3: Check Point Certified Security Expert - R80340 Questions
Select questions type
Which of the following is the BEST method for managing users in an enterprise?
Free
(Multiple Choice)
4.9/5
(43)
Correct Answer:
D
------- can mimic the symptoms of a denial-of-service attack, and the resulting loss in productivity can be no less devastating to an organization.
Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
D
_________ is a type of cryptography, where letters of an original message are systematically rearranged into another sequence.
Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
C
Which of these metrics measure how a biometric device performs, when attempting to authenticate subjects? (Choose THREE.)
(Multiple Choice)
4.7/5
(31)
Which of the following is MOST likely to cause management to view a security-needs proposal as invalid?
(Multiple Choice)
4.8/5
(30)
Which of the following are enterprise administrative controls? (Choose TWO.)
(Multiple Choice)
4.9/5
(38)
INFOSEC professionals are concerned about providing due care and due diligence. With whom should they consult, when protecting information assets?
(Multiple Choice)
4.9/5
(33)
Which of the following represents a valid reason for testing a patch on a non-production system, before applying it to a production system?
(Multiple Choice)
4.8/5
(32)
Virtual corporations typically use a(n) ___________ for maintaining centralized information assets.
(Multiple Choice)
4.8/5
(24)
Internal intrusions are loosely divided into which categories? (Choose TWO.)
(Multiple Choice)
4.9/5
(50)
What type of document contains information on alternative business locations, IT resources, and personnel?
(Multiple Choice)
4.8/5
(30)
You are a system administrator managing a pool of database servers. Your software vendor releases a service pack, with many new features. What should you do? (Choose TWO.)
(Multiple Choice)
4.9/5
(41)
A(n) __________ is an abstract machine, which mediates all access subjects have to objects.
(Multiple Choice)
4.9/5
(42)
Operating-svstem fingerprinting uses all of the following, EXCEPT ______, to identify a target operating system.
(Multiple Choice)
4.9/5
(36)
Which of the following tests provides testing teams some information about hosts or networks?
(Multiple Choice)
4.7/5
(41)
Which of the following is an integrity requirement for Remote Offices/Branch Offices (ROBOs)?
(Multiple Choice)
4.8/5
(42)
Which types of security solutions should a home user deploy? (Choose TWO.)
(Multiple Choice)
4.9/5
(26)
_________ intrusion detection involves comparing traffic to known characteristics of malicious traffic, known as attack signatures.
(Multiple Choice)
4.9/5
(39)
Showing 1 - 20 of 60
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)