CISSP Domain 3

CISSP Domain 3

Professional Development

20 Qs

quiz-placeholder

Similar activities

Volume 1-2 Reloaded (TT1L Tue)

Volume 1-2 Reloaded (TT1L Tue)

University - Professional Development

20 Qs

Java Basics

Java Basics

Professional Development

17 Qs

Java Chapter 7 Review Questions

Java Chapter 7 Review Questions

Professional Development

23 Qs

Technical Quiz - Level 2

Technical Quiz - Level 2

Professional Development

15 Qs

Cryptography

Cryptography

Professional Development

17 Qs

Round 1

Round 1

Professional Development

20 Qs

SEC+ Ch.7 Review Test

SEC+ Ch.7 Review Test

Professional Development

15 Qs

Sécurité - CC2

Sécurité - CC2

Professional Development

16 Qs

CISSP Domain 3

CISSP Domain 3

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Miftah Rahman

Used 14+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

The Secure Hash Algorithm (SHA-1) creates:

a fixed length message digest from a fixed length input message

a variable length message digest from a variable length input message

a fixed length message digest from a variable length input message

a variable length message digest from a fixed length input message

2.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

A public key algorithm that does both encryption and digital signature is which of the following?

RSA

AES

3DES

SHA

3.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

Which of the following was developed by the National Computer Security Center (NCSC) for the US Department of Defense?

TCSEC

ITSEC

ICC

ISO 27001

4.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

Which of the following statements relating to the Bell-LaPadula security model is FALSE?

A subject is not allowed to read up.

The property restriction can be escaped by temporarily downgrading a high level subject.

A subject is not allowed to read down.

It is restricted to confidentiality.

5.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

Which of the following is a class A fire?

common combustibles

liquid

electrical

Halon

6.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

Which of the following questions is less likely to help in assessing physical and environmental protection?

Are entry codes changed periodically?

Are appropriate fire suppression and prevention devices installed and working?data transmission lines controlled?

Are there processes to ensure that unauthorized individuals cannot read, copy, alter, or steal printed or electronic information?

Is physical access to data transmission lines controlled?

7.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

Which security model introduces access to objects only through programs?

The Biba model

The Bell-LaPadula model

The Clark-Wilson model

The information flow model

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?