70 Chapter 3 ■ Security Architecture and Engineering (Domain 3)
7 7. John and Gary are negotiating a business transaction, and John must demonstrate to Gary
that he has access to a system. He engages in an electronic version of the “magic door”
scenario shown here. What technique is John using?
1
2
Image reprinted from CISSP (ISC) 2 Certified Information Systems Security Professional Official Study
Guide, 7th Edition © John Wiley & Sons 2015, reprinted with permission.
A. Split-knowledge proof
B. Zero-knowledge proof
C. Logical proof
D. Mathematical proof
- Raj is selecting an encryption algorithm for use in his organization and would like to be
able to vary the strength of the encryption with the sensitivity of the information. Which
one of the following algorithms allows the use of different key strengths?
A. Blowfish
B. DES
C. Skipjack
D. IDEA - Referring to the fire triangle shown here, which one of the following suppression materials
attacks a fire by removing the fuel source?