Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Checkpoint 156-110 Exam -

Free 156-110 Sample Questions:

Q: 1 A(n) ______ is a one-way mathematical function that maps variable values into smaller values of a fixed length.

A. Symmetric key
B. Algorithm
C. Back door
D. Hash function
E. Integrity

Answer: D

Q: 2 INFOSEC professionals are concerned about providing due care and due diligence. With whom should they consult, when protecting information assets?

A. Law enforcement in their region
B. Senior management, particularly business-unit owners
C. IETF enforcement officials
D. Other INFOSEC professionals
E. Their organizations' legal experts

Answer: E

Q: 3 How do virtual corporations maintain confidentiality?

A. Encryption
B. Checksum
C. Data hashes
D. Redundant servers
E. Security by obscurity

Answer: A

Q: 4 All of the following are possible configurations for a corporate intranet, EXCEPT:

A. Value-added network
B. Wide-area network
C. Campus-area network
D. Metropolitan-area network
E. Local-area network

Answer: A

Q: 5 Which of the following is NOT an auditing function that should be performed regularly?

A. Reviewing IDS alerts
B. Reviewing performance logs
C. Reviewing IDS logs
D. Reviewing audit logs
E. Reviewing system logs

Answer: B

Q: 6 The items listed below are examples of ______ controls.

*Procedures and policies
*Employee security-awareness training
*Employee background checks
*Increasing management security awareness

A. Technical
B. Administrative
C. Role-based
D. Mandatory
E. Physical

Answer: B

Q: 7 Digital signatures are typically provided by a ______, where a third party verifies a key's authenticity.

A. Network firewall
B. Security administrator
C. Domain controller
D. Certificate Authority
E. Hash function

Answer: D

Q: 8 Which of the following is MOST likely to cause management to view a security-needs proposal as invalid?

A. Real-world examples
B. Exaggeration
C. Ranked threats
D. Quantified risks
E. Temperate manner

Answer: B

Q: 9 What is mandatory sign-on? An authentication method that:

A. uses smart cards, hardware tokens, and biometrics to authenticate users; also known as three-factor authentication
B. requires the use of one-time passwords, so users authenticate only once, with a given set of credentials
C. requires users to re-authenticate at each server and access control
D. stores user credentials locally, so that users need only authenticate the first time a local machine is used
E. allows users to authenticate once, and then uses tokens or other credentials to manage subsequent authentication attempts

Answer: C

Q: 10 One individual is selected from each department, to attend a security-awareness course. Each person returns to his department, delivering the course to the remainder of the department. After training is complete, each person acts as a peer coach. Which type of training is this?

A. On-line training
B. Formal classroom training
C. Train-the-mentor training
D. Alternating-facilitator training
E. Self-paced training

Answer: C

Q: 11 Which of the following is a cost-effective solution for securely transmitting data between remote offices?

A. Standard e-mail
B. Fax machine
C. Virtual private network
D. Bonded courier
E. Telephone

Answer: C

Q: 12 Which of the following statements about the maintenance and review of information security policies is NOT true?

A. The review and maintenance of security policies should be tied to the performance evaluations of accountable individuals.
B. Review requirements should be included in the security policies themselves.
C. When business requirements change, security policies should be reviewed to confirm that policies reflect the new business requirements.
D. Functional users and information custodians are ultimately responsible for the accuracy and relevance of information security policies.
E. In the absence of changes to business requirements and processes, information-security policy reviews should be annual.

Answer: D

Q: 13 Which of the following tests provides testing teams some information about hosts or networks?

A. Partial-knowledge test
B. Full-knowledge test
C. Zero-knowledge test

Answer: A

Q: 14 ______ can mimic the symptoms of a denial-of-service attack, and the resulting loss in productivity can be no less devastating to an organization.

A. ICMP traffic
B. Peak traffic
C. Fragmented packets
D. Insufficient bandwidth
E. Burst traffic

Answer: D

Q: 15 Which of the following is the MOST important consideration, when developing security- awareness training materials?

A. Training material should be accessible and attractive.
B. Delivery mechanisms should allow easy development of additional materials, to complement core material.
C. Security-awareness training materials should never contradict an organizational security policy.
D. Appropriate language should be used to facilitate localization, should training materials require translation.
E. Written documentation should be archived, in case of disaster.

Answer: C

Q: 16 To comply with the secure design principle of fail-safe defaults, what must a system do if it receives an instruction it does not understand? The system should:

A. send the instruction to a peer server, to see if the peer can execute. B. not attempt to execute the instruction.
C. close the connection, and refuse all further traffic from the originator.
D. not launch its debugging features, and attempt to resolve the instruction.
E. search for a close match in the instruction set it understands.

Answer: B

Q: 17 Which of these metrics measure how a biometric device performs, when attempting to authenticate subjects? (Choose THREE.)

A. False Rejection Rate
B. User Acceptance Rate
C. Crossover Error Rate
D. False Acceptance Rate
E. Enrollment Failure Rate

Answer: A, C, D

Q: 18 Why should the number of services on a server be limited to required services?

A. Every open service represents a potential vulnerability.
B. Closed systems require special connectivity services.
C. Running extra services makes machines more efficient.
D. All services are inherently stable and secure.
E. Additional services make machines more secure.

Answer: A

Q: 19 ______ intrusion detection involves comparing traffic to known characteristics of malicious traffic, known as attack signatures.

A. Pattern matching
B. Statistical anomaly
C. Behavioral analysis
D. Host
E. Network

Answer: A

Q: 20 Which of the following calculations is used when selecting countermeasures?

A. Annualized Rate of Occurrence
B. Single Loss Expectancy
C. Annualized Loss Expectancy
D. Business Impact Analysis
E. Business Continuity Plan

Answer: C

Q: 21 Virtual corporations typically use a(n) ______ for maintaining centralized information assets.

A. Off-line repository
B. Floppy disk
C. Data warehouse
D. CD-ROM burner
E. Colocation

Answer: E

Q: 22 Which of these choices correctly describe denial-of-service (DoS) attacks? (Choose THREE.)

A. DoS attacks do not require attackers to have any privileges on a target system.
B. DoS attacks are nearly impossible to stop, once they begin.
C. DoS attacks free the target system of excessive overhead.
D. DoS ties up a system with so many requests, system resources are consumed, and performance degrades.
E. DoS attacks cause the attacked system to accept legitimate access requests.

Answer: A, B, D

Q: 23 Which of the following is NOT a restriction, for partners accessing internal corporate resources through an extranet?

A. Preventing modification of restricted information
B. Using restricted programs, to access databases and other information resources
C. Allowing access from any location
D. Preventing access to any network resource, other than those explicitly permitted
E. Viewing inventory levels for partner products only

Answer: C

Q: 24 A(n) ______ is issued by senior management, and defines an organization's security goals.

A. Records-retention procedure
B. Acceptable-use policy
C. Organizational security policy
D. Security policy mission statement
E. Service level agreement

Answer: D

Q: 25 ______ occurs when an individual or process acquires a higher level of privilege, or access, than originally intended.

A. Security Triad
B. Privilege aggregation
C. Need-to-know
D. Privilege escalation
E. Least privilege

Answer: D

Q: 26 ______ is a smaller, enhanced version of the X.500 protocol. It is used to provide directory-service information. (Choose the BEST answer.)

A. Lightweight Directory Access Protocol
B. X.400 Directory Access Protocol
C. Access control list
D. Lightweight Host Configuration Protocol
E. Role-based access control

Answer: A

Q: 27 Which of the following is an integrity requirement for Remote
Offices/Branch Offices (ROBOs)?

A. Private data must remain internal to an organization.
B. Data must be consistent between ROBO sites and headquarters.
C. Users must be educated about appropriate security policies.
D. Improvised solutions must provide the level of protection required.
E. Data must remain available to all remote offices.

Answer: B

Q: 28 ______ are the people who consume, manipulate, and produce information assets.

A. Information asset owners
B. Business-unit owners
C. Audit-control groups
D. Information custodians
E. Functional users

Answer: E

Q: 29 You are a system administrator managing a pool of database servers. Your software vendor releases a service pack, with many new features. What should you do? (Choose TWO.)

A. Eliminate the testing phase of change control.
B. Read the release notes.
C. Refuse to install the service pack.
D. Install the service pack on all production database servers.
E. Install the service pack on a database server, in a test environment.

Answer: B, E

Q: 30 Enterprise employees working remotely require access to data at an organization's headquarters. Which of the following is the BEST method to transfer this data?

A. Standard e-mail
B. Faxed information
C. Dial-in access behind the enterprise firewall
D. Virtual private network
E. CD-ROMs shipped with updated versions of the data

Answer: D

© 2014, All Rights Reserved