CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

70 Chapter 3 ■ Security Architecture and Engineering (Domain 3)


7 7. John and Gary are negotiating a business transaction, and John must demonstrate to Gary
that he has access to a system. He engages in an electronic version of the “magic door”
scenario shown here. What technique is John using?

1

2

Image reprinted from CISSP (ISC) 2 Certified Information Systems Security Professional Official Study
Guide, 7th Edition © John Wiley & Sons 2015, reprinted with permission.

A. Split-knowledge proof
B. Zero-knowledge proof
C. Logical proof
D. Mathematical proof


  1. Raj is selecting an encryption algorithm for use in his organization and would like to be
    able to vary the strength of the encryption with the sensitivity of the information. Which
    one of the following algorithms allows the use of different key strengths?
    A. Blowfish
    B. DES
    C. Skipjack
    D. IDEA

  2. Referring to the fire triangle shown here, which one of the following suppression materials
    attacks a fire by removing the fuel source?

Free download pdf