Exam 1: Check Point Certified Security Principles Associate (CCSPA)

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

----------- is issued by senior management, and defines an organization's security goals.

(Multiple Choice)
4.8/5
(46)

When attempting to identify OPSEC indicators, information-security professionals must: (Choose THREE.)

(Multiple Choice)
4.9/5
(31)

Which of the following is a cost-effective solution for securely transmitting data between remote offices?

(Multiple Choice)
5.0/5
(40)

A(n) __________ occurs when intrusion-detection measures fail to recognize suspicious traffic or activity.

(Multiple Choice)
4.8/5
(38)

One individual is selected from each department, to attend a security-awareness course. Each person returns to his department, delivering the course to the remainder of the department. After training is complete, each person acts as a peer coach. Which type of training is this?

(Multiple Choice)
4.8/5
(36)

A new U.S. Federal Information Processing Standard specifies a cryptographic algorithm. This algorithm is used by U.S. government organizations to protect sensitive, but unclassified, information. What is the name of this Standard?

(Multiple Choice)
4.9/5
(28)

Which encryption algorithm has the highest bit strength?

(Multiple Choice)
4.9/5
(40)

You are considering purchasing a VPN solution to protect your organization's information assets. The solution you are reviewing uses RFC-compliant and open-standards encryption schemes. The vendor has submitted the system to a variety of recognized testing authorities. The vendor does not make the source code available to testing authorities. Does this solution adhere to the secure design principle of open design?

(Multiple Choice)
4.8/5
(36)

A(n) ___________ is the first step for determining which technical information assets should be protected.

(Multiple Choice)
4.9/5
(40)

Which type of access management uses information about job duties and positions, to indicate subjects' clearance levels?

(Multiple Choice)
4.9/5
(42)

A _____________ attack uses multiple systems to launch a coordinated attack.

(Multiple Choice)
4.8/5
(28)

Which of the following best describes the largest security challenge for Remote Offices/Branch Offices?

(Multiple Choice)
4.9/5
(34)

ABC Corporation's network requires users to authenticate to cross the border firewall, and before entering restricted segments. Servers containing sensitive information require separate authentication. This is an example of which type of access-control method?

(Multiple Choice)
4.8/5
(29)

Which principle of secure design states that a security mechanism's methods must be testable?

(Multiple Choice)
4.9/5
(47)

Which of the following statements about encryption's benefits is false? Encryption can: (Choose TWO.)

(Multiple Choice)
4.8/5
(36)

Organizations____________ risk, when they convince another entity to assume the risk for them.

(Multiple Choice)
4.7/5
(36)

The items listed below are examples of ___________ controls. *Procedures and policies *Employee security-awareness training *Employee background checks *Increasing management security awareness

(Multiple Choice)
4.9/5
(41)

Which of the following are appropriate uses of asymmetric encryption? (Choose THREE.)

(Multiple Choice)
4.8/5
(43)

Which of the following is NOT an auditing function that should be performed regularly?

(Multiple Choice)
4.7/5
(34)

Which of the following equations results in the Single Loss Expectancy for an asset?

(Multiple Choice)
4.7/5
(27)
Showing 41 - 60 of 60
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)