156-110 : Check Point Certified Security Principles Associate (CCSPA) : Part 01

  1. Which type of access management allows subjects to control some access of objects for other subjects?

    • Discretionary
    • Hybrid
    • Mandatory
    • Role-based
    • Nondiscretionary
  2. Why should user populations be segmented?

    • To allow resources to be shared among employees
    • To allow appropriate collaboration, and prevent inappropriate resource sharing
    • To prevent appropriate collaboration
    • To provide authentication services
    • To prevent the generation of audit trails from gateway devices
  3. Public servers are typically placed in the ——— to enhance security.

    • Restricted Entry Zone
    • Open Zone
    • Internet Zone
    • Demilitarized Zone
    • Public Entry Zone
  4. To comply with the secure design principle of fail-safe defaults, what must a system do if it receives an instruction it does not understand? The system should:

    • send the instruction to a peer server, to see if the peer can execute.
    • not attempt to execute the instruction.
    • close the connection, and refuse all further traffic from the originator.
    • not launch its debugging features, and attempt to resolve the instruction.
    • search for a close match in the instruction set it understands.
  5. Which of the following are enterprise administrative controls? (Choose TWO.)

    • Network access control
    • Facility access control
    • Password authentication
    • Background checks
    • Employee handbooks
  6. You are a system administrator managing a pool of database servers. Your software vendor releases a service pack, with many new features. What should you do? (Choose TWO.)

    • Eliminate the testing phase of change control.
    • Read the release notes
    • Refuse to install the service pack.
    • Install the service pack on all production database servers.
    • Install the service pack on a database server, in a test environment.
  7. How do virtual corporations maintain confidentiality?

    • Encryption
    • Checksum
    • Data hashes
    • Redundant servers
    • Security by obscurity
  8. Which of these choices correctly describe denial-of-service (DoS) attacks? (Choose THREE.)

    • DoS attacks do not require attackers to have any privileges on a target system,
    • DoS attacks are nearly impossible to stop, once they begin.
    • DoS attacks free the target system of excessive overhead.
    • DoS ties up a system with so many requests, system resources are consumed, and performance degrades. 
    • DoS attacks cause the attacked system to accept legitimate access requests.
  9. Which of the following is MOST likely to cause management to view a security-needs proposal as invalid?

    • Real-world examples
    • Exaggeration
    • Ranked threats
    • quantified risks
    • Temperate manner
  10. _________ is a smaller, enhanced version of theX.500 protocol. It is used to provide directory-service information. (Choose the BEST answer.)

    • Lightweight Directory Access Protoco
    • X.400 Directory Access Protocol
    • Access control list
    • Lightweight Host Configuration Protoc
    • Role-based access control
  11. What is the purpose of resource isolation?

    • To reduce the level of broadcast traffic on physical segments.
    • To ensure that anyone accessing a resource has appropriate integrity.
    • To automate the creation of access control lists and Trusted Computing Bases.
    • To enforce access controls, and clearly separate resources from each other.
    • To make people buy more computers than they really need.
  12. _________ intrusion-detection systems learn the behavior of a machine or network, and create a baseline.

    • Behavioral analysis
    • Statistical anomaly 
    • Network
    • Pattern matching
    • Host
  13. You are considering purchasing a VPN solution to protect your organization’s information assets. The solution you are reviewing uses RFC-compliant and open-standards encryption schemes. The vendor has submitted the system to a variety of recognized testing authorities. The vendor does not make the source code available to testing authorities. Does this solution adhere to the secure design principle of open design?

    • No, because the software vendor could have changed the code after testing, which is not verifiable.
    • No, because the software vendor submitted the software to testing authorities only, and did not make the software available to the public for testing.
    • Yes, because the methods were tested by recognized testing authorities, and the source code is protected from vandalism.
    • Yes, because the methods are open, and the system does not rely on the secrecy of its internal mechanisms to provide protection.
    • No, because if a software vendor refuses to reveal the source code for a product, it cannot comply with the open-design principle.
  14. ABC Corporation’s network is configured such that a user must log in individually at each server and access control. Which type of authentication is in use?

    • Role-based access control
    • Three-factor authentication
    • Single sign-on
    • Hybrid access control
    • Mandatory sign-on
  15. ABC Corporation’s network requires users to authenticate to cross the border firewall, and before entering restricted segments. Servers containing sensitive information require separate authentication. This is an example of which type of access-control method?

    • Single sign-on
    • Decentralized access control
    • Hybrid access control
    • Layered access control 
    • Mandatory access control
  16. Which of the following is NOT a Business Continuity Plan (BCP) recovery strategy?

    • Delegating risk to another entity, such as an insurer
    • Manual procedures; alternative solution to technology available
    • Deferring action; action waiting until a later date
    • Reciprocal agreements with another organization
    • Doing nothing; no action taken to recover the technology
  17. _________ involves gathering pieces of information and drawing a conclusion, whose sensitivity exceeds any of the Individual pieces of Information.

    • Inference
    • Social engineering
    • Movement analysis
    • Communication-pattern analysis
    • Aggregation
  18. What is mandatory sign-on? An authentication method that:

    • uses smart cards, hardware tokens, and biometrics to authenticate users; also known as three-factor authentication
    • requires the use of one-time passwords, so users authenticate only once, with a given set of credentials
    • requires users to re-authenticate at each server and access control
    • stores user credentials locally, so that users need only authenticate the first time a local machine is used
    • allows users to authenticate once, and then uses tokens or other credentials to manage subsequent authentication attempts
  19. Virtual corporations typically use a(n) ___________ for maintaining centralized information assets.

    • Off-line repository
    • Floppy disk
    • Data warehouse
    • CD-ROM burner
    • Colocation
  20. Which of the following best describes the largest security challenge for Remote Offices/Branch Offices?

    • Leased-line security
    • Salami attacks
    • Unauthorized network connectivity
    • Distributed denial-of-service attacks
    • Secure access to remote organizational resources
Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments