CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 3 ■ Security Architecture and Engineering (Domain 3) 63


A. Visual cryptography
B. Steganography
C. Cryptographic hashing
D. Transport layer security


  1. Which one of the following terms accurately describes the Caesar cipher?


A. Transposition cipher
B. Block cipher
C. Shift cipher
D. Strong cipher


  1. In the ring protection model shown here, what ring contains the operating system’s kernel?


RING 3

RING 2

RING 1

RING 0

A. Ring 0
B. Ring 1
C. Ring 2
D. Ring 3


  1. In an infrastructure as a service (IaaS) environment where a vendor supplies a customer
    with access to storage services, who is normally responsible for removing sensitive data
    from drives that are taken out of service?
    A. Customer’s security team
    B. Customer’s storage team
    C. Customer’s vendor management team
    D. Vendor

Free download pdf