Chapter 3 ■ Security Architecture and Engineering (Domain 3) 71
Chemical
Reaction
Heat
Oxygen Fuel
Image reprinted from CISSP (ISC) 2 Certified Information Systems Security Professional Official Study
Guide, 7th Edition © John Wiley & Sons 2015, reprinted with permission.
A. Water
B. Soda acid
C. Carbon dioxide
D. Halon
- Howard is choosing a cryptographic algorithm for his organization, and he would like to
choose an algorithm that supports the creation of digital signatures. Which one of the fol-
lowing algorithms would meet his requirement?
A. RSA
B. DES
C. AES
D. Blowfish - Laura is responsible for securing her company’s web-based applications and wishes to
conduct an educational program for developers on common web application security vul-
nerabilities. Where can she turn for a concise listing of the most common web application
issues?
A. CVE
B. NSA
C. OWA SP
D. CSA - The Bell-LaPadula and Biba models implement state machines in a fashion that uses what
specific state machine model?
A. Information flow
B. Noninterference
C. Cascading
D. Feedback