Free Checkpoint 156-110 Exam Braindumps (page: 6)

Which of the following is NOT an auditing function that should be performed regularly?

  1. Reviewing IDS alerts
  2. Reviewing performance logs
  3. Reviewing IDS logs
  4. Reviewing audit logs
  5. Reviewing system logs

Answer(s): B



Which TWO of the following items should be accomplished, when interviewing candidates for a position within an organization?

  1. Hire an investigation agency to run background checks.
  2. Verify all dates of previous employment.
  3. question candidates, using polygraphs, n
  4. Contact personal and professional references.
  5. Run criminal-background checks.

Answer(s): B,D



Which of these metrics measure how a biometric device performs, when attempting to authenticate subjects? (Choose THREE.)

  1. False Rejection Rate
  2. User Acceptance Rate
  3. Crossover Error Rate
  4. False Acceptance Rate
  5. Enrollment Failure Rate

Answer(s): A,C,D



A new U.S. Federal Information Processing Standard specifies a cryptographic algorithm. This algorithm is used by U.S. government organizations to protect sensitive, but unclassified, information. What is the name of this Standard?

  1. Triple DES
  2. Blowfish
  3. AES
  4. CAST
  5. RSA

Answer(s): C



Viewing page 6 of 26
Viewing questions 21 - 24 out of 100 questions



Post your Comments and Discuss Checkpoint 156-110 exam prep with other Community members:

156-110 Exam Discussions & Posts