Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Certification
Study Set
Checkpoint
Exam 1: Check Point Certified Security Principles Associate (CCSPA)
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
ABC Corporation's network requires users to authenticate to cross the border firewall, and before entering restricted segments. Servers containing sensitive information require separate authentication. This is an example of which type of access-control method?
Question 22
Multiple Choice
Which of the following should be included in an enterprise Business Continuity Plan (BCP) ? (Choose THREE.)
Question 23
Multiple Choice
INFOSEC professionals are concerned about providing due care and due diligence. With whom should they consult, when protecting information assets?
Question 24
Multiple Choice
Virtual corporations typically use a(n) ___________ for maintaining centralized information assets.
Question 25
Multiple Choice
One individual is selected from each department, to attend a security-awareness course. Each person returns to his department, delivering the course to the remainder of the department. After training is complete, each person acts as a peer coach. Which type of training is this?
Question 26
Multiple Choice
A __________ posture provides many levels of security possibilities, for access control.
Question 27
Multiple Choice
_________ is a type of cryptography, where letters of an original message are systematically rearranged into another sequence.
Question 28
Multiple Choice
A(n) __________ occurs when intrusion-detection measures fail to recognize suspicious traffic or activity.
Question 29
Multiple Choice
A(n) ___________ is a one-way mathematical function that maps variable values into smaller values of a fixed length.
Question 30
Multiple Choice
Maintenance of the Business Continuity Plan (BCP) must be integrated with________an organization's process.
Question 31
Multiple Choice
Distinguish between the role of the data owner and the role of the data custodian. Complete the following sentence. The data owner is the:
Question 32
Multiple Choice
A(n) ___________ is the first step for determining which technical information assets should be protected.
Question 33
Multiple Choice
Which of the following best describes the largest security challenge for Remote Offices/Branch Offices?
Question 34
Multiple Choice
Which of the following statements about the maintenance and review of information security policies is NOT true?
Question 35
Multiple Choice
What is mandatory sign-on? An authentication method that:
Question 36
Multiple Choice
Why does the (ISC) 2 access-control systems and methodology functional domain address both the confidentiality and integrity aspects of the Information Security Triad? Access-control systems and methodologies:
Question 37
Multiple Choice
The items listed below are examples of ___________ controls. *Procedures and policies *Employee security-awareness training *Employee background checks *Increasing management security awareness