Adobe CheckPoint 156-110 Certadept IBM Exam Questions - IBM Certified Advanced System Administrator with Notes and Domino 9.0 Certification

Study for IBM CheckPoint 156-110 exam with CheckPoint 156-110 questions and answers - Pass CheckPoint 156-110 exam and achieve IBM Certified Advanced System Administrator - Notes and Domino 9.0 certification.

Adobe CheckPoint 156-110 Certadept IBM Exam Questions - IBM Certified Advanced System Administrator with Notes and Domino 9.0 Certification

Exam A
QUESTION 1
A(n) ________________ is a one-way mathematical function that maps variable values into smaller values of a fixed length.
A. Symmetric key
B. Algorithm
C. Back door
D. Hash function
E. Integrity

Correct Answer: D
QUESTION 2
INFOSEC professionals are concerned about providing due care and due diligence. With whom should they consult, when protecting information assets?
A. Law enforcement in their region
B. Senior management, particularly business-unit owners
C. IETF enforcement officials
D. Other INFOSEC professionals
E. Their organizations' legal experts

Correct Answer: E
QUESTION 3
How do virtual corporations maintain confidentiality?
A. Encryption
B. Checksum
C. Data hashes
D. Redundant servers
E. Security by obscurity

Correct Answer: A
QUESTION 4
All of the following are possible configurations for a corporate intranet, EXCEPT:
A. Value-added network
B. Wide-area network
C. Campus-area network
D. Metropolitan-area network
E. Local-area network
Correct Answer: A

QUESTION 5
Which of the following is NOT an auditing function that should be performed regularly?
A. Reviewing IDS alerts
B. Reviewing performance logs
C. Reviewing IDS logs
D. Reviewing audit logs
E. Reviewing system logs

Correct Answer: B
QUESTION 6
The items listed below are examples of ___________________ controls.
*Procedures and policies *Employee security-awareness training *Employee background checks *Increasing management security awareness
A. Technical
B. Administrative
C. Role-based
D. Mandatory
E. Physical

Correct Answer: B
QUESTION 7
Digital signatures are typically provided by a ____________________, where a third party verifies a key's authenticity.
A. Network firewall
B. Security administrator
C. Domain controller
D. Certificate Authority
E. Hash function

Correct Answer: D

 

http://www.flydumps.com/156-110.html