Exam 1: Check Point Certified Security Principles Associate (CCSPA)

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is likely in a small-business environment?

(Multiple Choice)
4.8/5
(38)

Which of the following entities review partner-extranet requirements?

(Multiple Choice)
4.8/5
(42)

Which of the following should be included in an enterprise Business Continuity Plan (BCP)? (Choose THREE.)

(Multiple Choice)
4.8/5
(34)

_________ educate(s) security administrators and end users about organizations' security policies.

(Multiple Choice)
4.9/5
(36)

Who should have physical access to network-connectivity devices and corporate servers?

(Multiple Choice)
4.9/5
(35)

Enterprise employees working remotely require access to data at an organization's headquarters. Which of the following is the BEST method to transfer this data?

(Multiple Choice)
4.9/5
(37)

Public servers are typically placed in the --------- to enhance security.

(Multiple Choice)
4.9/5
(32)

What is mandatory sign-on? An authentication method that:

(Multiple Choice)
4.8/5
(38)

All of the following are possible configurations for a corporate intranet, EXCEPT:

(Multiple Choice)
4.7/5
(35)

Which of these strategies can be employed to test training effectiveness? (Choose THREE.)

(Multiple Choice)
4.8/5
(30)

A(n)___________ is a one-way mathematical function that maps variable values into smaller values of a fixed length.

(Multiple Choice)
4.8/5
(41)

------------ is the process of subjects establishing who they are to an access control.

(Multiple Choice)
4.8/5
(28)

A __________ posture provides many levels of security possibilities, for access control.

(Multiple Choice)
4.9/5
(25)

When should procedures be evaluated?

(Multiple Choice)
4.9/5
(28)

Maintenance of the Business Continuity Plan (BCP) must be integrated with________an organization's process.

(Multiple Choice)
4.8/5
(34)

Distinguish between the role of the data owner and the role of the data custodian. Complete the following sentence. The data owner is the:

(Multiple Choice)
4.8/5
(40)

Which type of Business Continuity Plan (BCP) test involves shutting down z on-line, and moving all operations to the alternate site?

(Multiple Choice)
4.8/5
(37)

Why does the (ISC)2 access-control systems and methodology functional domain address both the confidentiality and integrity aspects of the Information Security Triad? Access-control systems and methodologies:

(Multiple Choice)
4.9/5
(45)

Which of the following statements about the maintenance and review of information security policies is NOT true?

(Multiple Choice)
4.8/5
(29)

Which TWO of the following items should be accomplished, when interviewing candidates for a position within an organization?

(Multiple Choice)
4.9/5
(33)
Showing 21 - 40 of 60
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)