156-110 Check Point Certified Security Principles Associate Set 5

You are a system administrator managing a pool of database servers. Your software vendor releases a service pack, with many new features. What should you do? (Choose TWO.)


Options are :

  • Install the service pack on all production database servers.
  • Refuse to install the service pack.
  • Install the service pack on a database server, in a test environment.
  • Read the release notes
  • Eliminate the testing phase of change control.

Answer : Install the service pack on a database server, in a test environment. Read the release notes

156-110 Check Point Certified Security Principles Associate Set 6

_________ are the people who consume, manipulate, and produce information assets.


Options are :

  • Information asset owners
  • Audit-control groups
  • Functional users
  • Business-unit owners
  • Information custodians

Answer : Functional users

What is the purpose of resource isolation?


Options are :

  • To make people buy more computers than they really need.
  • To reduce the level of broadcast traffic on physical segments.
  • To automate the creation of access control lists and Trusted Computing Bases.
  • To ensure that anyone accessing a resource has appropriate integrity
  • To enforce access controls, and clearly separate resources from each other.

Answer : To enforce access controls, and clearly separate resources from each other.

Which of these choices correctly describe denial-of-service (DoS) attacks? (Choose THREE.)


Options are :

  • DoS attacks are nearly impossible to stop, once they begin.
  • DoS attacks cause the attacked system to accept legitimate access requests.
  • DoS attacks free the target system of excessive overhead.
  • DoS ties up a system with so many requests, system resources are consumed, and performance degrades.
  • DoS attacks do not require attackers to have any privileges on a target system,

Answer : DoS attacks are nearly impossible to stop, once they begin. DoS ties up a system with so many requests, system resources are consumed, and performance degrades. DoS attacks do not require attackers to have any privileges on a target system,

156-110 Check Point Certified Security Principles Associate Set 7

Which of the following tests provides testing teams some information about hosts or networks?


Options are :

  • Zero-knowledge test
  • Full-knowledge test
  • NONE
  • Partial-knowledge test

Answer : Partial-knowledge test

Who should have physical access to network-connectivity devices & corporate servers?


Options are :

  • Only appropriate information-technology personnel
  • Customers and clients
  • Only the maintenance staff
  • Accounting, information-technology, and auditing staff
  • Managers and C-level executives

Answer : Only appropriate information-technology personnel

_________ is a method of tricking users into revealing passwords, or other sensitive information.


Options are :

  • Means testing
  • Dumpster diving
  • Social engineering
  • Risk
  • Exposure

Answer : Social engineering

156-115 Check Point Certified Security Master - Final Exam Set 1

A _____________ attack uses multiple systems to launch a coordinated attack.


Options are :

  • FTP Bounce
  • Birthday
  • Salami
  • Distributed denial-of-service
  • Teardrop

Answer : Distributed denial-of-service

To comply with the secure design principle of fail-safe defaults, what must a system do if it receives an instruction it does not understand? The system should:


Options are :

  • Not launch its debugging features, and attempt to resolve the instruction.
  • Search for a close match in the instruction set it understands.
  • Cose the connection, and refuse all further traffic from the originator.
  • Not attempt to execute the instruction.
  • Send the instruction to a peer server, to see if the peer can execute.

Answer : Not attempt to execute the instruction.

_________ is a smaller, enhanced version of theX.500 protocol. It is used to provide directory-service information. (Choose the BEST answer.)


Options are :

  • X.400 Directory Access Protocol
  • Role-based access control
  • Lightweight Host Configuration Protoc
  • Access control list
  • Lightweight Directory Access Protoco

Answer : Lightweight Directory Access Protoco

156-115 Check Point Certified Security Master - Final Exam Set 2

Why should user populations be segmented?


Options are :

  • To allow appropriate collaboration, and prevent inappropriate resource sharing
  • To prevent appropriate collaboration
  • To prevent the generation of audit trails from gateway devices
  • To allow resources to be shared among employees
  • To provide authentication services

Answer : To allow appropriate collaboration, and prevent inappropriate resource sharing

How do virtual corporations maintain confidentiality?


Options are :

  • Security by obscurity
  • Data hashes
  • Encryption
  • Redundant servers
  • Checksum

Answer : Encryption

You are considering purchasing a VPN solution to protect your organization's information assets. The solution you are reviewing uses RFC-compliant & open-standards encryption schemes. The vendor has submitted the system to a variety of recognized testing authorities. The vendor does not make the source code available to testing authorities. Does this solution adhere to the secure design principle of open design?


Options are :

  • No, because the software vendor could have changed the code after testing, which is not verifiable
  • No, because if a software vendor refuses to reveal the source code for a product, it cannot comply with the open-design principle.
  • Yes, because the methods are open, and the system does not rely on the secrecy of its internal mechanisms to provide protection.
  • Yes, because the methods were tested by recognized testing authorities, and the source code is protected from vandalism.
  • No, because the software vendor submitted the software to testing authorities only, and did not make the software available to the public for testing.

Answer : Yes, because the methods are open, and the system does not rely on the secrecy of its internal mechanisms to provide protection.

156-115 Check Point Certified Security Master - Final Exam Set 3

Which type of access management allows subjects to control some access of objects for other subjects?


Options are :

  • Hybrid
  • Discretionary
  • Nondiscretionary
  • Role-based
  • Mandatory

Answer : Discretionary

Which of the following is the BEST method for managing users in an enterprise?


Options are :

  • Enter user data in a spreadsheet.
  • Implement centralized access control
  • Use a Domain Name System
  • Deploy Kerberos
  • Place them in a centralized Lightweight Directory Access Protocol.

Answer : Place them in a centralized Lightweight Directory Access Protocol.

Maintenance of the Business Continuity Plan (BCP) must be integrated with________an organizationís process.


Options are :

  • Discretionary-budget
  • Inventory-maintenance
  • Compensation-review
  • Disaster-recovery
  • Change-control

Answer : Change-control

156-115 Check Point Certified Security Master - Final Exam Set 4

_________ intrusion-detection systems learn the behavior of a machine or network, and create a baseline.


Options are :

  • Behavioral analysis
  • Host
  • Pattern matching
  • Behavioral analysis
  • Network

Answer : Behavioral analysis

Public servers are typically placed in the --------- to enhance security.


Options are :

  • Public Entry Zone
  • Restricted Entry Zone
  • Demilitarized Zone
  • Internet Zone
  • Open Zone

Answer : Demilitarized Zone

Which of the following are enterprise administrative controls? (Choose TWO.)


Options are :

  • Background checks
  • Facility access control
  • Employee handbooks
  • Network access control
  • Password authentication

Answer : Background checks Employee handbooks

156-115 Check Point Certified Security Master - Final Exam Set 5

Which of the following is MOST likely to cause management to view a security-needs proposal as invalid?


Options are :

  • Ranked threats
  • Real-world examples
  • Temperate manner
  • Exaggeration
  • quantified risks

Answer : Exaggeration

Which of the following are appropriate uses of asymmetric encryption? (Choose THREE.)


Options are :

  • Public Web site access
  • Data-integrity checking
  • Sneaker net
  • Authentication
  • Secure key-exchange mechanisms

Answer : Data-integrity checking Authentication Secure key-exchange mechanisms

156-115 Check Point Certified Security Master - Final Exam Set 6

Why should the number of services on a server be limited to required services?


Options are :

  • Closed systems require special connectivity services.
  • Additional services make machines more secure.
  • Running extra services makes machines more efficient.
  • Every open service represents a potential vulnerability.
  • All services are inherently stable and secure.

Answer : Every open service represents a potential vulnerability.

Which of these strategies can be employed to test training effectiveness? (Choose THREE.)


Options are :

  • Provide feedback forms for employees to rate instruction and training material, immediately after training has ended
  • Give incentives to employees who attend security-awareness training. Perform spotchecks, to see if incentives are displayed
  • Test employees on security concepts several months after training has ended.
  • Create a survey for managers, to see if participants practice behaviors presented during training.
  • Include auditors before and after the training. This checks to see if the number of security-related incidents is reduced, because of the training.

Answer : Test employees on security concepts several months after training has ended. Create a survey for managers, to see if participants practice behaviors presented during training. Include auditors before and after the training. This checks to see if the number of security-related incidents is reduced, because of the training.

If e-mail is subject to review by individuals other than the sender and recipient, what should be clearly stated in the organization's e-mail policy?


Options are :

  • No expectation of privacy for e-mail communications, using the organization's resources
  • Senior management and business-unit owner responsibilities and delegation options
  • Technologies and methods used to monitor and enforce the organization's policies
  • Consequences for violation of the organization's acceptable-use policy
  • Clear, legally defensible definition of what constitutes a business record

Answer : No expectation of privacy for e-mail communications, using the organization's resources

156-115 Check Point Certified Security Master - Final Exam Set 7

What is single sign-on ? An authentication method :


Options are :

  • that uses smart cards, hardware tokens, and biometrics to authenticate users; also known as three-factor authentication
  • that allows users to authenticate once, and then uses tokens or other credentials to manage subsequent authentication attempts
  • requiring the use of one-time passwords, so users authenticate only once, with a given set of credentials.
  • that stores user credentials locally, so that users need only authenticate the first time, a local machine is used
  • that requires users to re-authenticate for every resource accessed

Answer : that allows users to authenticate once, and then uses tokens or other credentials to manage subsequent authentication attempts

Which of the following represents a valid reason for testing a patch on a non-production system, before applying it to a production system?


Options are :

  • Only patches on vendor-pressed CDs can be trusted.
  • Patches are a kind of virus.
  • Patches usually break important system functionality.
  • Patches always overwrite user data.
  • Patches may re-enable services previously disabled

Answer : Patches may re-enable services previously disabled

When should procedures be evaluated?


Options are :

  • Whenever business processes are modified
  • When new exploits and attacks are discovered
  • On the anniversary of the procedures' implementation
  • When new functional users join an organization
  • Each time procedures are used

Answer : Whenever business processes are modified

156-110 Check Point Certified Security Principles Associate Set 1

Which of the following calculations is used when selecting countermeasures?


Options are :

  • Annualized Rate of Occurrence
  • Business Impact Analysis
  • Single Loss Expectancy
  • Business Continuity Plan
  • Annualized Loss Expectancy

Answer : Annualized Loss Expectancy

You are preparing a machine that will be used as a dedicated Web server, be removed?


Options are :

  • HTTP
  • FTP
  • SMTP
  • E.IRC
  • PVP

Answer : HTTP

Which principle of secure design states that a security mechanism's methods must be testable?


Options are :

  • Least common mechanism
  • Complete mediation
  • Economy of mechanism
  • Open design
  • Separation of privilege

Answer : Open design

156-110 Check Point Certified Security Principles Associate Set 2

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions