Chapter 3 ■ Security Architecture and Engineering (Domain 3) 55
A. Simple Security Property
B. Simple Integrity Property
C. *-Security Property
D. *-Integrity Property
- Tom is responsible for maintaining the security of systems used to control industrial pro-
cesses located within a power plant. What term is used to describe these systems?
A. POW ER
B. SCADA
C. H AVA L
D. COBOL - Sonia recently removed an encrypted hard drive from a laptop and moved it to a new
device because of a hardware failure. She is having difficulty accessing encrypted content
on the drive despite the fact that she knows the user’s password. What hardware security
feature is likely causing this problem?
A. TCB
B. TPM
C. N IACAP
D. RSA - Chris wants to verify that a software package that he downloaded matches the original
version. What hashing tool should he use if he believes that technically sophisticated
attackers may have replaced the software package with a version containing a backdoor?
A. MD5
B. 3DES
C. SHA1
D. SHA 256
For questions 16–19, please refer to the following scenario:
Alice and Bob would like to use an asymmetric cryptosystem to communicate with each
other. They are located in different parts of the country but have exchanged encryption
keys by using digital certificates signed by a mutually trusted certificate authority.
- If Alice wishes to send Bob an encrypted message, what key does she use to encrypt the
message?
A. Alice’s public key
B. Alice’s private key
C. Bob’s public key
D. Bob’s private key