66 Chapter 3 ■ Security Architecture and Engineering (Domain 3)
- In the diagram shown here of security boundaries within a computer system, what compo-
nent’s name has been replaced with XXX?
XXX
Process Process Process
Reference
Monitor
User Space
Kernel
A. Kernel
B. TCB
C. Security perimeter
D. User execution
- Sherry conducted an inventory of the cryptographic technologies in use within her organi-
zation and found the following algorithms and protocols in use. Which one of these tech-
nologies should she replace because it is no longer considered secure?
A. MD5
B. 3DES
C. PGP
D. W PA 2 - What action can you take to prevent accidental data disclosure due to wear leveling on an
SSD device before reusing the drive?
A. Reformatting
B. Disk encryption
C. Degaussing
D. Physical destruction