CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

66 Chapter 3 ■ Security Architecture and Engineering (Domain 3)



  1. In the diagram shown here of security boundaries within a computer system, what compo-
    nent’s name has been replaced with XXX?


XXX

Process Process Process

Reference
Monitor

User Space

Kernel

A. Kernel
B. TCB
C. Security perimeter
D. User execution


  1. Sherry conducted an inventory of the cryptographic technologies in use within her organi-
    zation and found the following algorithms and protocols in use. Which one of these tech-
    nologies should she replace because it is no longer considered secure?
    A. MD5
    B. 3DES
    C. PGP
    D. W PA 2

  2. What action can you take to prevent accidental data disclosure due to wear leveling on an
    SSD device before reusing the drive?
    A. Reformatting
    B. Disk encryption
    C. Degaussing
    D. Physical destruction

Free download pdf