CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 3 ■ Security Architecture and Engineering (Domain 3) 55


A. Simple Security Property
B. Simple Integrity Property
C. *-Security Property
D. *-Integrity Property


  1. Tom is responsible for maintaining the security of systems used to control industrial pro-
    cesses located within a power plant. What term is used to describe these systems?
    A. POW ER
    B. SCADA
    C. H AVA L
    D. COBOL

  2. Sonia recently removed an encrypted hard drive from a laptop and moved it to a new
    device because of a hardware failure. She is having difficulty accessing encrypted content
    on the drive despite the fact that she knows the user’s password. What hardware security
    feature is likely causing this problem?
    A. TCB
    B. TPM
    C. N IACAP
    D. RSA

  3. Chris wants to verify that a software package that he downloaded matches the original
    version. What hashing tool should he use if he believes that technically sophisticated
    attackers may have replaced the software package with a version containing a backdoor?
    A. MD5
    B. 3DES
    C. SHA1
    D. SHA 256


For questions 16–19, please refer to the following scenario:

Alice and Bob would like to use an asymmetric cryptosystem to communicate with each
other. They are located in different parts of the country but have exchanged encryption
keys by using digital certificates signed by a mutually trusted certificate authority.


  1. If Alice wishes to send Bob an encrypted message, what key does she use to encrypt the
    message?
    A. Alice’s public key
    B. Alice’s private key
    C. Bob’s public key
    D. Bob’s private key

Free download pdf