CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 3 ■ Security Architecture and Engineering (Domain 3) 71


Chemical
Reaction

Heat

Oxygen Fuel

Image reprinted from CISSP (ISC) 2 Certified Information Systems Security Professional Official Study
Guide, 7th Edition © John Wiley & Sons 2015, reprinted with permission.

A. Water
B. Soda acid
C. Carbon dioxide
D. Halon


  1. Howard is choosing a cryptographic algorithm for his organization, and he would like to
    choose an algorithm that supports the creation of digital signatures. Which one of the fol-
    lowing algorithms would meet his requirement?
    A. RSA
    B. DES
    C. AES
    D. Blowfish

  2. Laura is responsible for securing her company’s web-based applications and wishes to
    conduct an educational program for developers on common web application security vul-
    nerabilities. Where can she turn for a concise listing of the most common web application
    issues?
    A. CVE
    B. NSA
    C. OWA SP
    D. CSA

  3. The Bell-LaPadula and Biba models implement state machines in a fashion that uses what
    specific state machine model?
    A. Information flow
    B. Noninterference
    C. Cascading
    D. Feedback

Free download pdf