62 Chapter 3 ■ Security Architecture and Engineering (Domain 3)
- Which one of the following terms is not used to describe a privileged mode of system
operation?
A. User mode
B. Kernel mode
C. Supervisory mode
D. System mode - James is working with a Department of Defense system that is authorized to simultane-
ously handle information classified at the Secret and Top Secret levels. What type of
system is he using?
A. Single state
B. Unclassified
C. Compartmented
D. Multistate - Kyle is being granted access to a military computer system that uses System High mode.
What is not true about Kyle’s security clearance requirements?
A. Kyle must have a clearance for the highest level of classification processed by the
system, regardless of his access.
B. Kyle must have access approval for all information processed by the system.
C. Kyle must have a valid need to know for all information processed by the system.
D. Kyle must have a valid security clearance. - Gary intercepts a communication between two individuals and suspects that they are
exchanging secret messages. The content of the communication appears to be the image
shown here. What type of technique may the individuals use to hide messages inside
this image?