Chapter 3 ■ Security Architecture and Engineering (Domain 3) 63
A. Visual cryptography
B. Steganography
C. Cryptographic hashing
D. Transport layer security
- Which one of the following terms accurately describes the Caesar cipher?
A. Transposition cipher
B. Block cipher
C. Shift cipher
D. Strong cipher
- In the ring protection model shown here, what ring contains the operating system’s kernel?
RING 3
RING 2
RING 1
RING 0
A. Ring 0
B. Ring 1
C. Ring 2
D. Ring 3
- In an infrastructure as a service (IaaS) environment where a vendor supplies a customer
with access to storage services, who is normally responsible for removing sensitive data
from drives that are taken out of service?
A. Customer’s security team
B. Customer’s storage team
C. Customer’s vendor management team
D. Vendor