156-110 Check Point Certified Security Principles Associate Set 4

Which of the following statements about the maintenance and review of information security policies is NOT true?


Options are :

  • Functional users and information custodians are ultimately responsible for the accuracy and relevance of information security policies (Correct)
  • In the absence of changes to business requirements and processes, informationsecurity policy reviews should be annual.
  • Review requirements should be included in the security policies themselves
  • When business requirements change, security policies should be reviewed to confirm that policies reflect the new business requirements.
  • The review and maintenance of security policies should be tied to the performance evaluations of accountable individuals.

Answer : Functional users and information custodians are ultimately responsible for the accuracy and relevance of information security policies

A(n) ___________ is the first step for determining which technical information assets should be protected.


Options are :

  • Network diagram (Correct)
  • Intrusion detection system
  • Business Impact Analysis
  • Office floor plan
  • Firewall

Answer : Network diagram

Which of the following best describes the largest security challenge for Remote Offices/Branch Offices?


Options are :

  • Secure access to remote organizational resources (Correct)
  • Salami attacks
  • Leased-line security
  • Distributed denial-of-service attacks
  • Unauthorized network connectivity

Answer : Secure access to remote organizational resources

156-110 Check Point Certified Security Principles Associate Set 5

Which of the following is NOT a Business Continuity Plan (BCP) recovery strategy?


Options are :

  • Delegating risk to another entity, such as an insurer (Correct)
  • Doing nothing; no action taken to recover the technology
  • Manual procedures; alternative solution to technology available
  • Deferring action; action waiting until a later date
  • Reciprocal agreements with another organization

Answer : Delegating risk to another entity, such as an insurer

What is mandatory sign-on? An authentication method that:


Options are :

  • stores user credentials locally, so that users need only authenticate the first time a local machine is used
  • requires the use of one-time passwords, so users authenticate only once, with a given set of credentials
  • uses smart cards, hardware tokens, and biometrics to authenticate users; also known as three-factor authentication
  • requires users to re-authenticate at each server and access control (Correct)
  • allows users to authenticate once, and then uses tokens or other credentials to manage subsequent authentication attempts

Answer : requires users to re-authenticate at each server and access control

________ involves gathering pieces of information and drawing a conclusion, whose sensitivity exceeds any of the Individual pieces of Information.


Options are :

  • Inference
  • Aggregation (Correct)
  • Movement analysis
  • Communication-pattern analysis
  • Social engineering

Answer : Aggregation

156-110 Check Point Certified Security Principles Associate Set 6

A(n) ___________ is an unintended communication path that can be used to violate a system security policy.


Options are :

  • Covert channel (Correct)
  • Simple rule violation
  • Integrity axiom
  • Inferred fact
  • Aggregated data set

Answer : Covert channel

A __________ posture provides many levels of security possibilities, for access control.


Options are :

  • Multiple offensive
  • Layered defensive (Correct)
  • Proactive offensive
  • Flat defensive
  • Reactive defensive

Answer : Layered defensive

Enterprise employees working remotely require access to data at an organization's headquarters. Which of the following is the BEST method to transfer this data?


Options are :

  • Dial-in access behind the enterprise firewall
  • Virtual private network (Correct)
  • CD-ROMs shipped with updated versions of the data
  • Standard e-mail
  • Faxed information

Answer : Virtual private network

156-110 Check Point Certified Security Principles Associate Set 7

Virtual corporations typically use a(n) ___________ for maintaining centralized information assets.


Options are :

  • Colocation (Correct)
  • Off-line repository
  • Floppy disk
  • Data warehouse
  • CD-ROM burner

Answer : Colocation

----------- is issued by senior management, and defines an organization's security goals.


Options are :

  • Organizational security policy
  • Service level agreement
  • Records-retention procedure
  • Acceptable-use policy
  • Security policy mission statement (Correct)

Answer : Security policy mission statement

156-115 Check Point Certified Security Master - Final Exam Set 1

Which of the following entities review partner-extranet requirements?


Options are :

  • Shipping and receiving
  • Chief Information Officer
  • Information systems
  • Marketing
  • Requesting department (Correct)

Answer : Requesting department

Embedding symbols in images or common items, such as pictures or quilts, is an example of __________.


Options are :

  • Transposition cipher
  • Espionage
  • Key exchange
  • Steganography (Correct)
  • Arithmancy

Answer : Steganography

If e-mail is subject to review by individuals other than the sender and recipient, what should be clearly stated in the organization's e-mail policy?


Options are :

  • Senior management and business-unit owner responsibilities and delegation options
  • No expectation of privacy for e-mail communications, using the organization's resources (Correct)
  • Clear, legally defensible definition of what constitutes a business record
  • Technologies and methods used to monitor and enforce the organization's policies
  • Consequences for violation of the organization's acceptable-use policy

Answer : No expectation of privacy for e-mail communications, using the organization's resources

156-115 Check Point Certified Security Master - Final Exam Set 2

The items listed below are examples of ___________ controls. *Smart cards *Access control lists *Authentication servers *Auditing


Options are :

  • Mandatory
  • Physical
  • Administrative
  • Technical (Correct)
  • Role-based

Answer : Technical

Which of the following calculations is used when selecting countermeasures?


Options are :

  • Single Loss Expectancy
  • Business Continuity Plan
  • Annualized Loss Expectancy (Correct)
  • Annualized Rate of Occurrence
  • Business Impact Analysis

Answer : Annualized Loss Expectancy

#NAME?


Options are :

  • Baselining
  • Penetration testing (Correct)
  • A countermeasure
  • A vulnerability
  • Exploitation

Answer : Penetration testing

156-115 Check Point Certified Security Master - Final Exam Set 3

Which of these strategies can be employed to test training effectiveness? (Choose THREE.)


Options are :

  • Include auditors before and after the training. This checks to see if the number of security-related incidents is reduced, because of the training. (Correct)
  • Provide feedback forms for employees to rate instruction and training material, immediately after training has ended
  • Create a survey for managers, to see if participants practice behaviors presented during training. (Correct)
  • Give incentives to employees who attend security-awareness training. Perform spotchecks, to see if incentives are displayed
  • Test employees on security concepts several months after training has ended. (Correct)

Answer : Include auditors before and after the training. This checks to see if the number of security-related incidents is reduced, because of the training. Create a survey for managers, to see if participants practice behaviors presented during training. Test employees on security concepts several months after training has ended.

You are preparing a machine that will be used as a dedicated Web server, be removed?


Options are :

  • E.IRC
  • PVP
  • FTP
  • SMTP
  • HTTP (Correct)

Answer : HTTP

A security administrator implements Secure Configuration Verification (SCV), because SCV: (Choose THREE.)


Options are :

  • Confirms that a remote configuration complies with the organization's security policy. (Correct)
  • Prevents attackers from penetrating headquarters' Security Gateway
  • Enables the administrator to monitor the configuration of remote computers. (Correct)
  • Can block connectivity for machines that do not comply with the organization's security policy (Correct)
  • Does not enable the administrator to monitor the configuration of remote computers

Answer : Confirms that a remote configuration complies with the organization's security policy. Enables the administrator to monitor the configuration of remote computers. Can block connectivity for machines that do not comply with the organization's security policy

156-115 Check Point Certified Security Master - Final Exam Set 4

Which of the following represents a valid reason for testing a patch on a non-production system, before applying it to a production system?


Options are :

  • Patches are a kind of virus.
  • Patches may re-enable services previously disabled (Correct)
  • Patches always overwrite user data.
  • Only patches on vendor-pressed CDs can be trusted.
  • Patches usually break important system functionality.

Answer : Patches may re-enable services previously disabled

Why should the number of services on a server be limited to required services?


Options are :

  • Closed systems require special connectivity services.
  • Every open service represents a potential vulnerability. (Correct)
  • All services are inherently stable and secure.
  • Running extra services makes machines more efficient.
  • Additional services make machines more secure.

Answer : Every open service represents a potential vulnerability.

What is single sign-on ? An authentication method :


Options are :

  • that requires users to re-authenticate for every resource accessed
  • that stores user credentials locally, so that users need only authenticate the first time, a local machine is used
  • that uses smart cards, hardware tokens, and biometrics to authenticate users; also known as three-factor authentication
  • requiring the use of one-time passwords, so users authenticate only once, with a given set of credentials.
  • that allows users to authenticate once, and then uses tokens or other credentials to manage subsequent authentication attempts (Correct)

Answer : that allows users to authenticate once, and then uses tokens or other credentials to manage subsequent authentication attempts

156-115 Check Point Certified Security Master - Final Exam Set 5

You are a system administrator for a pool of Web servers. The vendor who sells your Web server posts a patch and sample exploit for a newly discovered vulnerability. You will take all of the actions listed below. Which of the following actions should you take first?


Options are :

  • Run the sample exploit against a test server. (Correct)
  • Run the sample exploit against a production server.
  • Test the patch on a non-production server.
  • Apply the patch to all production servers.
  • Test the patch on a production server

Answer : Run the sample exploit against a test server.

Which of the following is the MOST important consideration, when developing securityawareness training materials?


Options are :

  • Training material should be accessible and attractive
  • Delivery mechanisms should allow easy development of additional materials, to complement core material.
  • Appropriate language should be used to facilitate localization, should training materials require translation.
  • Written documentation should be archived, in case of disaster.
  • Security-awareness training materials should never contradict an organizational security policy. (Correct)

Answer : Security-awareness training materials should never contradict an organizational security policy.

#NAME?


Options are :

  • Insufficient bandwidth (Correct)
  • Fragmented packets
  • Burst traffic
  • ICMPtraffic
  • Peak traffic

Answer : Insufficient bandwidth

156-115 Check Point Certified Security Master - Final Exam Set 6

Which of the following are appropriate uses of asymmetric encryption? (Choose THREE.)


Options are :

  • Data-integrity checking (Correct)
  • Public Web site access
  • Authentication (Correct)
  • Secure key-exchange mechanisms (Correct)
  • Sneaker net

Answer : Data-integrity checking Authentication Secure key-exchange mechanisms

Which principle of secure design states that a security mechanism's methods must be testable?


Options are :

  • Economy of mechanism
  • Least common mechanism
  • Complete mediation
  • Separation of privilege
  • Open design (Correct)

Answer : Open design

#NAME?


Options are :

  • Validation
  • Authentication
  • Identification (Correct)
  • Authorization
  • Biometrics

Answer : Identification

156-110 Check Point Certified Security Principles Associate Set 1

When should procedures be evaluated?


Options are :

  • When new exploits and attacks are discovered
  • On the anniversary of the procedures' implementation
  • When new functional users join an organization
  • Each time procedures are used
  • Whenever business processes are modified (Correct)

Answer : Whenever business processes are modified

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions

Subscribe to See Videos

Subscribe to my Youtube channel for new videos : Subscribe Now