Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

156-110 Check Point Certified Security Principles Associate (CCSPA) Questions and Answers

Questions 4

A(n) _______________ is an unintended communication path that can be used to violate a system security policy.

Options:

A.

Covert channel

B.

Integrity axiom

C.

Simple rule violation

D.

Inferred fact

E.

Aggregated data set

Buy Now
Questions 5

You are a system administrator managing a pool of database servers. Your software vendor releases a service pack, with many new features. What should you do? (Choose TWO.)

Options:

A.

Eliminate the testing phase of change control.

B.

Read the release notes.

C.

Refuse to install the service pack.

D.

Install the service pack on all production database servers.

E.

Install the service pack on a database server, in a test environment.

Buy Now
Questions 6

Which of the following is an example of a simple, physical-access control?

Options:

A.

Lock

B.

Access control list

C.

Background check

D.

Token

E.

Firewall

Buy Now
Questions 7

The items listed below are examples of ___________________ controls.

*Smart cards

*Access control lists

*Authentication servers

*Auditing

Options:

A.

Role-based

B.

Administrative

C.

Technical

D.

Physical

E.

Mandatory

Buy Now
Questions 8

How do virtual corporations maintain confidentiality?

Options:

A.

Encryption

B.

Checksum

C.

Data hashes

D.

Redundant servers

E.

Security by obscurity

Buy Now
Questions 9

_______ is the process of confirming that implemented security safeguards work as expected.

Options:

A.

Penetration testing

B.

Exploitation

C.

Baselining

D.

A vulnerability

E.

A countermeasure

Buy Now
Questions 10

If a firewall receives traffic not explicitly permitted by its security policy, what should the firewall do?

Options:

A.

Nothing

B.

Do not log and drop the traffic.

C.

Log and drop the traffic.

D.

Log and pass the traffic.

E.

Do not log and pass the traffic.

Buy Now
Questions 11

At ABC Corporation, access to critical information resources, such as database and e-mail servers, is controlled by the information-technology (IT) department. The supervisor in the department grants access to printers where the printer is located. Managers grant and revoke rights to files within their departments' directories on the file server, but the IT department controls who has access to the directories. Which type of access-management system is in use at ABC Corporation?

Options:

A.

Centralized access management

B.

Role-based access management

C.

Hybrid access management

D.

Decentralized access management

E.

Privileged access management

Buy Now
Questions 12

All of the following are possible configurations for a corporate intranet, EXCEPT:

Options:

A.

Value-added network

B.

Wide-area network

C.

Campus-area network

D.

Metropolitan-area network

E.

Local-area network

Buy Now
Questions 13

____________________ educate(s) security administrators and end users about organizations' security policies.

Options:

A.

Security-awareness training

B.

Information Security (INFOSEC) briefings

C.

Acceptable-use policies

D.

Continuing education

E.

Nondisclosure agreements

Buy Now
Questions 14

Which of the following calculations is used when selecting countermeasures?

Options:

A.

Annualized Rate of Occurrence

B.

Single Loss Expectancy

C.

Annualized Loss Expectancy

D.

Business Impact Analysis

E.

Business Continuity Plan

Buy Now
Questions 15

Which of the following is likely in a small-business environment?

Options:

A.

Most small businesses employ a full-time information-technology staff.

B.

Resources are available as needed.

C.

Small businesses have security personnel on staff.

D.

Most employees have experience with information security.

E.

Security budgets are very small.

Buy Now
Questions 16

Which of the following is NOT a restriction, for partners accessing internal corporate resources through an extranet?

Options:

A.

Preventing modification of restricted information

B.

Using restricted programs, to access databases and other information resources

C.

Allowing access from any location

D.

Preventing access to any network resource, other than those explicitly permitted

E.

Viewing inventory levels for partner products only

Buy Now
Questions 17

Which of the following tests provides testing teams some information about hosts or networks?

Options:

A.

Partial-knowledge test

B.

Full-knowledge test

C.

Zero-knowledge test

Buy Now
Questions 18

You are a system administrator for a pool of Web servers. The vendor who sells your Web server posts a patch and sample exploit for a newly discovered vulnerability. You will take all of the actions listed below. Which of the following actions should you take first?

Options:

A.

Run the sample exploit against a test server.

B.

Run the sample exploit against a production server.

C.

Apply the patch to all production servers.

D.

Test the patch on a production server.

E.

Test the patch on a non-production server.

Buy Now
Questions 19

Organizations _______ risk, when they convince another entity to assume the risk for them.

Options:

A.

Elevate

B.

Assume

C.

Deny

D.

Transfer

E.

Mitigate

Buy Now
Questions 20

If e-mail is subject to review by individuals other than the sender and recipient, what should be clearly stated in the organization's e-mail policy?

Options:

A.

Technologies and methods used to monitor and enforce the organization's policies

B.

Senior management and business-unit owner responsibilities and delegation options

C.

Clear, legally defensible definition of what constitutes a business record

D.

Consequences for violation of the organization's acceptable-use policy

E.

No expectation of privacy for e-mail communications, using the organization's resources

Buy Now
Questions 21

When attempting to identify OPSEC indicators, information-security professionals must: (Choose THREE.)

Options:

A.

Discover the information daily activities yield.

B.

Meet with adversaries.

C.

Perform business impact analysis surveys.

D.

Scrutinize their organizations' daily activities.

E.

Analyze indicators, to determine the information an adversary can glean ?both from routine and nonroutine activities.

Buy Now
Questions 22

Which encryption algorithm has the highest bit strength?

Options:

A.

AES

B.

Blowfish

C.

DES

D.

CAST

E.

Triple DES

Buy Now
Questions 23

Which of these metrics measure how a biometric device performs, when attempting to authenticate subjects? (Choose THREE.)

Options:

A.

False Rejection Rate

B.

User Acceptance Rate

C.

Crossover Error Rate

D.

False Acceptance Rate

E.

Enrollment Failure Rate

Buy Now
Questions 24

Which of the following entities review partner-extranet requirements?

Options:

A.

Information systems

B.

Shipping and receiving

C.

Marketing

D.

Requesting department

E.

Chief Information Officer

Buy Now
Questions 25

Which of the following best describes the largest security challenge for Remote Offices/Branch Offices?

Options:

A.

Leased-line security

B.

Salami attacks

C.

Unauthorized network connectivity

D.

Distributed denial-of-service attacks

E.

Secure access to remote organizational resources

Buy Now
Questions 26

When should procedures be evaluated?

Options:

A.

When new functional users join an organization

B.

On the anniversary of the procedures' implementation

C.

Each time procedures are used

D.

Whenever business processes are modified

E.

When new exploits and attacks are discovered

Buy Now
Questions 27

Which type of access management allows subjects to control some access of objects for other subjects?

Options:

A.

Discretionary

B.

Hybrid

C.

Mandatory

D.

Role-based

E.

Nondiscretionary

Buy Now
Questions 28

Which type of Business Continuity Plan (BCP) test involves shutting down a primary site, bringing an alternate site on-line, and moving all operations to the alternate site?

Options:

A.

Parallel

B.

Full interruption

C.

Checklist

D.

Structured walkthrough

E.

Simulation

Buy Now
Questions 29

Why should user populations be segmented?

Options:

A.

To allow resources to be shared among employees

B.

To allow appropriate collaboration, and prevent inappropriate resource sharing

C.

To prevent appropriate collaboration

D.

To provide authentication services

E.

To prevent the generation of audit trails from gateway devices

Buy Now
Questions 30

Which of the following statements about the maintenance and review of information security policies is NOT true?

Options:

A.

The review and maintenance of security policies should be tied to the performance evaluations of accountable individuals.

B.

Review requirements should be included in the security policies themselves.

C.

When business requirements change, security policies should be reviewed to confirm that policies reflect the new business requirements.

D.

Functional users and information custodians are ultimately responsible for the accuracy and relevance of information security policies.

E.

In the absence of changes to business requirements and processes, information-security policy reviews should be annual.

Buy Now
Exam Code: 156-110
Exam Name: Check Point Certified Security Principles Associate (CCSPA)
Last Update: Apr 30, 2026
Questions: 100

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now 156-110 testing engine

PDF (Q&A)

$43.57  $124.49
buy now 156-110 pdf