CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

58 Chapter 3 ■ Security Architecture and Engineering (Domain 3)



  1. In the figure shown here, Harry’s request to write to the data file is blocked. Harry has a
    Secret security clearance, and the data file has a Confidential classification. What principle
    of the Bell-LaPadula model blocked this request?


Write Request

Harry Data File

A. Simple Security Property
B. Simple Integrity Property
C. *-Security Property
D. Discretionary Security Property


  1. Florian and Tobias would like to begin communicating using a symmetric cryptosystem,
    but they have no prearranged secret and are not able to meet in person to exchange keys.
    What algorithm can they use to securely exchange the secret key?
    A. IDEA
    B. Diffie-Hellman
    C. RSA
    D. MD5

  2. Under the Common Criteria, what element describes the security requirements for a product?
    A. TCSEC
    B. ITSEC
    C. PP
    D. ST

  3. Which one of the following is not one of the basic requirements for a cryptographic
    hash function?
    A. The function must work on fixed-length input.
    B. The function must be relatively easy to compute for any input.
    C. The function must be one way.
    D. The function must be collision free.

  4. How many possible keys exist for a cipher that uses a key containing 5 bits?
    A. 10
    B. 16
    C. 32
    D. 64

Free download pdf