Chapter 3 ■ Security Architecture and Engineering (Domain 3) 75
C. Typing with the rhythm of Morse code
D. Writing data to a shared memory space
- Which one of the following would be a reasonable application for the use of self-signed
digital certificates?
A. E-commerce website
B. Banking application
C. Internal scheduling application
D. Customer portal - Mike has been tasked with preventing an outbreak of malware like Mirai. What type of
systems should be protected in his organization?
A. Servers
B. SCADA
C. Mobile devices
D. Internet of Things (IoT) devices - A component failure in the primary HVAC system leads to a high temperature alarm in
the data center that Kim manages. After resolving the issue, what should Kim consider to
prevent future issues like this?
A. A closed loop chiller
B. Redundant cooling systems
C. Swamp coolers
D. Relocating the data center to a colder climate - As part of his team’s forensic investigation process, Matt signs drives and other evidence
out of storage before working with them. What type of documentation is he creating?
A. Criminal
B. Chain of custody
C. Civil
D. CYA - Lauren implements ASLR to help prevent system compromises. What technique has she
used to protect her system?
A. Encryption
B. Mandatory access control
C. Memory address randomization
D. Discretionary access control