156-110 Check Point Certified Security Principles Associate Set 7

A(n) ___________ is an unintended communication path that can be used to violate a system security policy.


Options are :

  • Integrity axiom
  • Aggregated data set
  • Covert channel (Correct)
  • Inferred fact
  • Simple rule violation

Answer : Covert channel

156-215.77 Check Point Certified Security Administrator Exam Set 4

Virtual corporations typically use a(n) ___________ for maintaining centralized information assets.


Options are :

  • Off-line repository
  • Floppy disk
  • CD-ROM burner
  • Colocation (Correct)
  • Data warehouse

Answer : Colocation

What is mandatory sign-on? An authentication method that:


Options are :

  • requires the use of one-time passwords, so users authenticate only once, with a given set of credentials
  • requires users to re-authenticate at each server and access control (Correct)
  • allows users to authenticate once, and then uses tokens or other credentials to manage subsequent authentication attempts
  • uses smart cards, hardware tokens, and biometrics to authenticate users; also known as three-factor authentication
  • stores user credentials locally, so that users need only authenticate the first time a local machine is used

Answer : requires users to re-authenticate at each server and access control

INFOSEC professionals are concerned about providing due care and due diligence. With whom should they consult, when protecting information assets?


Options are :

  • Senior management, particularly business-unit owners
  • IETF enforcement officials
  • Other INFOSEC professionals
  • Law enforcement in their region
  • Their organizations' legal experts (Correct)

Answer : Their organizations' legal experts

Check Point Certified Security Expert Exam Set 12

A(n) __________ is an abstract machine, which mediates all access subjects have to objects.


Options are :

  • ACL
  • Reference monitor (Correct)
  • Router
  • TCB
  • State machine

Answer : Reference monitor

ABC Corporation's network requires users to authenticate to cross the border firewall, and before entering restricted segments. Servers containing sensitive information require separate authentication. This is an example of which type of access-control method?


Options are :

  • Decentralized access control
  • Mandatory access control
  • Single sign-on
  • Hybrid access control
  • Layered access control (Correct)

Answer : Layered access control

________ involves gathering pieces of information and drawing a conclusion, whose sensitivity exceeds any of the Individual pieces of Information.


Options are :

  • Inference
  • Movement analysis
  • Communication-pattern analysis
  • Social engineering
  • Aggregation (Correct)

Answer : Aggregation

156-315.77 Check Point Certified Security Expert Exam Set 4

Which of the following statements about the maintenance and review of information security policies is NOT true?


Options are :

  • Functional users and information custodians are ultimately responsible for the accuracy and relevance of information security policies (Correct)
  • Review requirements should be included in the security policies themselves
  • When business requirements change, security policies should be reviewed to confirm that policies reflect the new business requirements.
  • The review and maintenance of security policies should be tied to the performance evaluations of accountable individuals.
  • In the absence of changes to business requirements and processes, informationsecurity policy reviews should be annual.

Answer : Functional users and information custodians are ultimately responsible for the accuracy and relevance of information security policies

________ is a type of cryptography, where letters of an original message are systematically rearranged into another sequence.


Options are :

  • Symmetric-key exchange
  • Asymmetric-key encryption
  • Simple substitution cipher
  • Steganography
  • Transposition cipher (Correct)

Answer : Transposition cipher

Why does the (ISC)2 access-control systems and methodology functional domain address both the confidentiality and integrity aspects of the Information Security Triad? Accesscontrol systems and methodologies:


Options are :

  • are required standards in health care and banking.
  • provide redundant systems and data backups.
  • are academic models not suitable for implementation.
  • control who is allowed to view and modify information (Correct)
  • set standards for acceptable media-storage devices.

Answer : control who is allowed to view and modify information

156-315.77 Check Point Certified Security Expert Exam Set 3

A(n) __________ occurs when intrusion-detection measures fail to recognize suspicious traffic or activity.


Options are :

  • Alarm
  • Threshold
  • CIFS pop-up
  • False positive
  • False negative (Correct)

Answer : False negative

A(n)___________ is a one-way mathematical function that maps variable values into smaller values of a fixed length.


Options are :

  • Algorithm
  • Integrity
  • Back door
  • Symmetric key
  • Hash function (Correct)

Answer : Hash function

If a firewall receives traffic not explicitly permitted by its security policy, what should the firewall do?


Options are :

  • Log and pass the traffic.
  • Log and drop the traffic. (Correct)
  • Do not log and pass the traffic.
  • Do not log and drop the traffic.
  • Nothing

Answer : Log and drop the traffic.

Distinguish between the role of the data owner and the role of the data custodian. Complete the following sentence. The data owner is the:


Options are :

  • Person or entity responsible for imposing and enforcing policies and restrictions, dictated by the functional user. The data custodian is a person or process who accesses and/or manipulates the information.
  • Person or process that originally creates the information. The data custodian is a role that shifts to any person or process currently accessing the data, and passes to the next person or process to access the data.
  • Person or entity who accesses/and or manipulates data or information, in the course of assigned duties. The data custodian is a person or process with the appropriate level of privilege to access the data.
  • Person or entity ultimately responsible for the security of an information asset. The data custodian is the person or entity responsible for imposing and enforcing policies and restrictions, dictated by the data owner. (Correct)
  • Department in the organization responsible for the data's physical storage location. The data custodian is anyone who has access the data for any reason.

Answer : Person or entity ultimately responsible for the security of an information asset. The data custodian is the person or entity responsible for imposing and enforcing policies and restrictions, dictated by the data owner.

Check Point Certified Security Expert Exam Set 12

At ABC Corporation, access to critical information resources, such as database and e-mail servers, is controlled by the information-technology (IT) department. The supervisor in the department grants access to printers where the printer is located. Managers grant and revoke rights to files within their departments' directories on the file server, but the IT department controls who has access to the directories. Which type of access-management system is in use at ABC Corporation?


Options are :

  • Centralized access management
  • Role-based access management
  • Privileged access management
  • Hybrid access management (Correct)
  • Decentralized access management

Answer : Hybrid access management

Which of the following is a cost-effective solution for securely transmitting data between remote offices?


Options are :

  • Standard e-mail
  • Telephone
  • Bonded courier
  • Fax machine
  • Virtual private network (Correct)

Answer : Virtual private network

Which of the following is an example of a simple, physical-access control?


Options are :

  • Access control list
  • Lock (Correct)
  • Background check
  • Firewall
  • Token

Answer : Lock

156-315.13 Check Point Security Expert R76 (GAiA) Exam Set 2

Which of the following best describes an external intrusion attempt on a local-area network (LAN)?


Options are :

  • External users attempt to access public resources.
  • Internal users perform inappropriate acts on assets to which they have been given rights or permissions.
  • Internal users try to gain unauthorized access to information assets outside the organizational perimeter.
  • External-intrusion attempts from sources outside the LAN are not granted permissions or rights to an organization's information assets (Correct)
  • External intruders attempt exploitation of vulnerabilities, to remove their own access.

Answer : External-intrusion attempts from sources outside the LAN are not granted permissions or rights to an organization's information assets

Which type of access management uses information about job duties and positions, to indicate subjects' clearance levels?


Options are :

  • Hybrid
  • Discretionary
  • Role-based (Correct)
  • Nondiscretionary
  • Mandatory

Answer : Role-based

Which of the following statements about encryption's benefits is false? Encryption can: (Choose TWO.)


Options are :

  • prevent information from being destroyed by malicious entities, while in transit (Correct)
  • allow private information to be sent over public networks, in relative safety.
  • significantly reduce the chance information will be viewed by unauthorized entities
  • only be used to protect data in transit. Encryption provides no protection to stored data (Correct)
  • significantly reduce the chance information will be modified by unauthorized entities.

Answer : prevent information from being destroyed by malicious entities, while in transit only be used to protect data in transit. Encryption provides no protection to stored data

156-215.75 Check Point Certified Security Administrator Exam Set 4

What type of document contains information on alternative business locations, IT resources, and personnel?


Options are :

  • Acceptable use policy
  • Business continuity plan (Correct)
  • End-user license agreement
  • Security policy
  • Nondisclosure agreement

Answer : Business continuity plan

A __________ posture provides many levels of security possibilities, for access control.


Options are :

  • Multiple offensive
  • Layered defensive (Correct)
  • Flat defensive
  • Reactive defensive
  • Proactive offensive

Answer : Layered defensive

Which of the following is NOT a Business Continuity Plan (BCP) recovery strategy?


Options are :

  • Delegating risk to another entity, such as an insurer (Correct)
  • Manual procedures; alternative solution to technology available
  • Deferring action; action waiting until a later date
  • Doing nothing; no action taken to recover the technology
  • Reciprocal agreements with another organization

Answer : Delegating risk to another entity, such as an insurer

156-315.71 Check Point Security Expert R71 Practice Exam Set 4

Which of the following best describes the largest security challenge for Remote Offices/Branch Offices?


Options are :

  • Distributed denial-of-service attacks
  • Salami attacks
  • Unauthorized network connectivity
  • Secure access to remote organizational resources (Correct)
  • Leased-line security

Answer : Secure access to remote organizational resources

A(n) ___________ is the first step for determining which technical information assets should be protected.


Options are :

  • Business Impact Analysis
  • Intrusion detection system
  • Network diagram (Correct)
  • Office floor plan
  • Firewall

Answer : Network diagram

All of the following are possible configurations for a corporate intranet, EXCEPT:


Options are :

  • Local-area network
  • Metropolitan-area network
  • Wide-area network
  • Value-added network (Correct)
  • Campus-area network

Answer : Value-added network

156-315.77 Check Point Certified Security Expert Exam Set 2

__________ is the state of being correct, or the degree of certainty a person or process can have, that the data in an information asset is correct.


Options are :

  • Availability
  • Authenticity
  • Confidentiality
  • Integrity (Correct)
  • Privacy

Answer : Integrity

ABC Corporation's network is configured such that a user must log in individually at each server and access control. Which type of authentication is in use?


Options are :

  • Single sign-on
  • Role-based access control
  • Mandatory sign-on (Correct)
  • Three-factor authentication
  • Hybrid access control

Answer : Mandatory sign-on

Enterprise employees working remotely require access to data at an organization's headquarters. Which of the following is the BEST method to transfer this data?


Options are :

  • Virtual private network (Correct)
  • Faxed information
  • CD-ROMs shipped with updated versions of the data
  • Standard e-mail
  • Dial-in access behind the enterprise firewall

Answer : Virtual private network

156-315.71 Check Point Security Expert R71 Practical Exam Set 3

The items listed below are examples of ___________ controls. *Procedures and policies *Employee security-awareness training *Employee background checks *Increasing management security awareness


Options are :

  • Mandatory
  • Administrative (Correct)
  • Role-based
  • Technical
  • Physical

Answer : Administrative

One individual is selected from each department, to attend a security-awareness course. Each person returns to his department, delivering the course to the remainder of the department. After training is complete, each person acts as a peer coach. Which type of training is this?


Options are :

  • On-line training
  • Train-the-mentor training (Correct)
  • Formal classroom training
  • Self-paced training
  • Alternating-facilitator training

Answer : Train-the-mentor training

Check Point Certified Security Expert Exam Set 11

A(n) _____________ is a quantitative review of risks, to determine how an organization continue to function, in the event a risk is realized. .


Options are :

  • Monitored risk process
  • Full interruption test
  • Information security audit
  • Business impact analysis (Correct)
  • Disaster-recovery plan

Answer : Business impact analysis

Which of the following are common failures that should be addressed in an (BCP) ? (Choose THREE.)


Options are :

  • Utility failures (Correct)
  • Connectivity failures (Correct)
  • Personal failures
  • Hardware failures (Correct)
  • Accounting failures

Answer : Utility failures Connectivity failures Hardware failures

Which of the following can be stored on a workstation? (Choose TWO.)


Options are :

  • Interoffice memo (Correct)
  • Payroll information
  • Customer correspondence (Correct)
  • Databases
  • Data objects used by many employees

Answer : Interoffice memo Customer correspondence

156-315.13 Check Point Security Expert R76(GAiA) Exam Set 11

Which of the following is NOT a concern for enterprise physical security?


Options are :

  • Network Intrusion Detection Systems (Correct)
  • Dumpster diving
  • Property theft
  • Social engineering
  • Unauthorized access to a facility

Answer : Network Intrusion Detection Systems

Which of the following should be included in an enterprise Business Continuity Plan (BCP)? (Choose THREE.)


Options are :

  • Employee administrative leave
  • Severe weather disasters (Correct)
  • Minor power outages (Correct)
  • Employee terminations
  • Accidental or intentional data deletion (Correct)

Answer : Severe weather disasters Minor power outages Accidental or intentional data deletion

_________ educate(s) security administrators and end users about organizations' security policies.


Options are :

  • Acceptable-use policies
  • Continuing education
  • Information Security (INFOSEC) briefings
  • Nondisclosure agreements
  • Security-awareness training (Correct)

Answer : Security-awareness training

156-315.65 Check Point Security Administration NGX R65 Exam Set 1

Which types of security solutions should a home user deploy? (Choose TWO.)


Options are :

  • Network intrusion-detection system
  • Managed Security Gateway
  • Personal firewall (Correct)
  • Anti-virus software (Correct)
  • Access control lists on a router

Answer : Personal firewall Anti-virus software

Digital signatures are typically provided by a _______, where a third party verifies a key’s authenticity.


Options are :

  • Network firewall
  • Certificate Authority (Correct)
  • Security administrator
  • Hash function
  • Domain controller

Answer : Certificate Authority

_________ intrusion detection involves comparing traffic to known characteristics of malicious traffic, known as attack signatures.


Options are :

  • Statistical anomaly
  • Host
  • Pattern matching (Correct)
  • Network
  • Behavioral analysis

Answer : Pattern matching

Check Point Certified Security Expert Exam Set 9

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions