64 Chapter 3 ■ Security Architecture and Engineering (Domain 3)
- Which one of the following is an example of a code, not a cipher?
A. Data Encryption Standard
B. “One if by land; two if by sea”
C. Shifting letters by three
D. Word scramble - Which one of the following systems assurance processes provides an independent third-
party evaluation of a system’s controls that may be trusted by many different organizations?
A. Certification
B. Definition
C. Verification
D. Accreditation - Process ensures that any behavior will affect only the memory and resources
associated with a process.
A. Restriction
B. Isolation
C. Limitation
D. Parameters - Harold is assessing the susceptibility of his environment to hardware failures and would
like to identify the expected lifetime of a piece of hardware. What measure should he use
for this?
A. MTTR
B. MTTF
C. RTO
D. MTO - What type of fire extinguisher is useful only against common combustibles?
A. Class A
B. Class B
C. Class C
D. Class D - Gary is concerned about applying consistent security settings to the many mobile devices
used throughout his organization. What technology would best assist with this challenge?
A. MDM
B. IPS
C. IDS
D. SIEM