Exam 1: Check Point Certified Security Principles Associate (CCSPA)

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is the BEST method for managing users in an enterprise?

Free
(Multiple Choice)
4.9/5
(43)
Correct Answer:
Verified

D

------- can mimic the symptoms of a denial-of-service attack, and the resulting loss in productivity can be no less devastating to an organization.

Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
Verified

D

_________ is a type of cryptography, where letters of an original message are systematically rearranged into another sequence.

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

C

What is the purpose of resource isolation?

(Multiple Choice)
4.8/5
(31)

Which of these metrics measure how a biometric device performs, when attempting to authenticate subjects? (Choose THREE.)

(Multiple Choice)
4.7/5
(31)

Which of the following is MOST likely to cause management to view a security-needs proposal as invalid?

(Multiple Choice)
4.8/5
(30)

Which of the following are enterprise administrative controls? (Choose TWO.)

(Multiple Choice)
4.9/5
(38)

INFOSEC professionals are concerned about providing due care and due diligence. With whom should they consult, when protecting information assets?

(Multiple Choice)
4.9/5
(33)

Why should user populations be segmented?

(Multiple Choice)
4.9/5
(19)

Which of the following represents a valid reason for testing a patch on a non-production system, before applying it to a production system?

(Multiple Choice)
4.8/5
(32)

Virtual corporations typically use a(n) ___________ for maintaining centralized information assets.

(Multiple Choice)
4.8/5
(24)

Internal intrusions are loosely divided into which categories? (Choose TWO.)

(Multiple Choice)
4.9/5
(50)

What type of document contains information on alternative business locations, IT resources, and personnel?

(Multiple Choice)
4.8/5
(30)

You are a system administrator managing a pool of database servers. Your software vendor releases a service pack, with many new features. What should you do? (Choose TWO.)

(Multiple Choice)
4.9/5
(41)

A(n) __________ is an abstract machine, which mediates all access subjects have to objects.

(Multiple Choice)
4.9/5
(42)

Operating-svstem fingerprinting uses all of the following, EXCEPT ______, to identify a target operating system.

(Multiple Choice)
4.9/5
(36)

Which of the following tests provides testing teams some information about hosts or networks?

(Multiple Choice)
4.7/5
(41)

Which of the following is an integrity requirement for Remote Offices/Branch Offices (ROBOs)?

(Multiple Choice)
4.8/5
(42)

Which types of security solutions should a home user deploy? (Choose TWO.)

(Multiple Choice)
4.9/5
(26)

_________ intrusion detection involves comparing traffic to known characteristics of malicious traffic, known as attack signatures.

(Multiple Choice)
4.9/5
(39)
Showing 1 - 20 of 60
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)