Chapter 11 ■ Practice Test 3 269
- Jack’s organization is a multinational nonprofit that has small offices in many developing
countries throughout the world. They need to implement an access control system that
allows flexibility and that can work despite poor Internet connectivity at their locations.
What is the best type of access control design for Jack’s organization?
A. Centralized access control
B. Mandatory access control
C. Decentralized access control
D. Rule-based access control - What US government classification label is applied to information that, if disclosed, could
cause serious damage to national security and also requires that the damage that would be
caused is able to be described or identified by the classification authority?
A. Classified
B. Secret
C. Confidential
D. Top S e c re t
For questions 46–49, please refer to the following scenario:
Mike and Renee would like to use an asymmetric cryptosystem to communicate with each
other. They are located in different parts of the country but have exchanged encryption
keys by using digital certificates signed by a mutually trusted certificate authority.
- When the certificate authority (CA) created Renee’s digital certificate, what key was con-
tained within the body of the certificate?
A. Renee’s public key
B. Renee’s private key
C. CA’s public key
D. CA’s private key - When the certificate authority created Renee’s digital certificate, what key did it use to
digitally sign the completed certificate?
A. Renee’s public key
B. Renee’s private key
C. CA’s public key
D. CA’s private key - When Mike receives Renee’s digital certificate, what key does he use to verify the authen-
ticity of the certificate?
A. Renee’s public key
B. Renee’s private key
C. CA’s public key
D. CA’s private key