Exam 1: Check Point Certified Security Principles Associate (CCSPA)
Exam 1: Check Point Certified Security Principles Associate (CCSPA)60 Questions
Exam 2: Check Point Certified Security Administrator (CCSA R80)676 Questions
Exam 3: Check Point Certified Security Expert - R80340 Questions
Select questions type
Which of the following is likely in a small-business environment?
(Multiple Choice)
4.8/5
(38)
Which of the following entities review partner-extranet requirements?
(Multiple Choice)
4.8/5
(42)
Which of the following should be included in an enterprise Business Continuity Plan (BCP)? (Choose THREE.)
(Multiple Choice)
4.8/5
(34)
_________ educate(s) security administrators and end users about organizations' security policies.
(Multiple Choice)
4.9/5
(36)
Who should have physical access to network-connectivity devices and corporate servers?
(Multiple Choice)
4.9/5
(35)
Enterprise employees working remotely require access to data at an organization's headquarters. Which of the following is the BEST method to transfer this data?
(Multiple Choice)
4.9/5
(37)
Public servers are typically placed in the --------- to enhance security.
(Multiple Choice)
4.9/5
(32)
All of the following are possible configurations for a corporate intranet, EXCEPT:
(Multiple Choice)
4.7/5
(35)
Which of these strategies can be employed to test training effectiveness? (Choose THREE.)
(Multiple Choice)
4.8/5
(30)
A(n)___________ is a one-way mathematical function that maps variable values into smaller values of a fixed length.
(Multiple Choice)
4.8/5
(41)
------------ is the process of subjects establishing who they are to an access control.
(Multiple Choice)
4.8/5
(28)
A __________ posture provides many levels of security possibilities, for access control.
(Multiple Choice)
4.9/5
(25)
Maintenance of the Business Continuity Plan (BCP) must be integrated with________an organization's process.
(Multiple Choice)
4.8/5
(34)
Distinguish between the role of the data owner and the role of the data custodian. Complete the following sentence. The data owner is the:
(Multiple Choice)
4.8/5
(40)
Which type of Business Continuity Plan (BCP) test involves shutting down z on-line, and moving all operations to the alternate site?
(Multiple Choice)
4.8/5
(37)
Why does the (ISC)2 access-control systems and methodology functional domain address both the confidentiality and integrity aspects of the Information Security Triad? Access-control systems and methodologies:
(Multiple Choice)
4.9/5
(45)
Which of the following statements about the maintenance and review of information security policies is NOT true?
(Multiple Choice)
4.8/5
(29)
Which TWO of the following items should be accomplished, when interviewing candidates for a position within an organization?
(Multiple Choice)
4.9/5
(33)
Showing 21 - 40 of 60
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)