Chapter 3 ■ Security Architecture and Engineering (Domain 3) 65
- Alice sent a message to Bob. Bob would like to demonstrate to Charlie that the message
he received definitely came from Alice. What goal of cryptography is Bob attempting to
achieve?
A. Authentication
B. Confidentiality
C. Nonrepudiation
D. Integrity - Rhonda is considering the use of new identification cards for physical access control in her
organization. She comes across a military system that uses the card shown here. What type
of card is this?
A. Smart card
B. Proximity card
C. Magnetic stripe card
D. Phase three card
- Gordon is concerned about the possibility that hackers may be able to use the Van Eck
radiation phenomenon to remotely read the contents of computer monitors in his facility.
What technology would protect against this type of attack?
A. TCSEC
B. SCSI
C. GHOST
D. TEMPEST