CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 3 ■ Security Architecture and Engineering (Domain 3) 65



  1. Alice sent a message to Bob. Bob would like to demonstrate to Charlie that the message
    he received definitely came from Alice. What goal of cryptography is Bob attempting to
    achieve?
    A. Authentication
    B. Confidentiality
    C. Nonrepudiation
    D. Integrity

  2. Rhonda is considering the use of new identification cards for physical access control in her
    organization. She comes across a military system that uses the card shown here. What type
    of card is this?


A. Smart card
B. Proximity card
C. Magnetic stripe card
D. Phase three card


  1. Gordon is concerned about the possibility that hackers may be able to use the Van Eck
    radiation phenomenon to remotely read the contents of computer monitors in his facility.
    What technology would protect against this type of attack?
    A. TCSEC
    B. SCSI
    C. GHOST
    D. TEMPEST

Free download pdf