72 Chapter 3 ■ Security Architecture and Engineering (Domain 3)
- The of a process consist(s) of the limits set on the memory addresses and
resources that the process may access.
A. Perimeter
B. Confinement limits
C. Metes
D. Bounds - What type of motion detector senses changes in the electromagnetic fields in monitored
areas?
A. Infrared
B. Wave pattern
C. Capacitance
D. Photoelectric - Which one of the following fire suppression systems uses a suppressant that is no longer
manufactured due to environmental concerns?
A. FM-200
B. Argon
C. Inergen
D. Halon - Which one of the following statements is correct about the Biba model of access control?
A. It addresses confidentiality and integrity.
B. It addresses integrity and availability.
C. It prevents covert channel attacks.
D. It focuses on protecting objects from integrity threats.
8 7. In Transport Layer Security, what type of key is used to encrypt the actual content of com-
munications between a web server and a client?
A. Ephemeral session key
B. Client’s public key
C. Server’s public key
D. Server’s private key
- Beth would like to include technology in a secure area of her data center to protect against
unwanted electromagnetic emanations. What technology would assist her with this goal?
A. Heartbeat sensor
B. Faraday cage
C. Piggybacking
D. W PA 2