Free 156-110 Exam Braindumps (page: 3)

Page 3 of 26

Operating-svstem fingerprinting uses all of the following, EXCEPT ______, to identify a target operating system.

  1. Sequence Verifier
  2. Initial sequence number
  3. Address spoofing
  4. Time to Live
  5. IP ID field

Answer(s): C



Internal intrusions are loosely divided into which categories? (Choose TWO.)

  1. Attempts by insiders to perform appropriate acts, on information assets to which they have been given rights or permissions.
  2. Attempts by insiders to access resources, without proper access rights
  3. Attempts by insiders to access external resources, without proper access rights.
  4. Attempts by insiders to perform inappropriate acts, on external information assets to which they have been given rights or permissions.
  5. Attempts by insiders to perform inappropriate acts, on information assets to which they have been given rights or permissions.

Answer(s): B,E



_________ occurs when an individual or process acquires a higher level of privilege. Or access, than originally intended.

  1. Security Triad
  2. Privilege aggregation
  3. Need-to-know
  4. Privilege escalation
  5. Least privilege

Answer(s): D



Which encryption algorithm has the highest bit strength?

  1. AES
  2. Blowfish
  3. DES
  4. CAST
  5. Triple DES

Answer(s): A






Post your Comments and Discuss Checkpoint 156-110 exam with other Community members:

156-110 Exam Discussions & Posts