
CISSP Domain 3
Authored by Miftah Rahman
Computers
Professional Development
Used 15+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
5 mins • 5 pts
The Secure Hash Algorithm (SHA-1) creates:
a fixed length message digest from a fixed length input message
a variable length message digest from a variable length input message
a fixed length message digest from a variable length input message
a variable length message digest from a fixed length input message
2.
MULTIPLE CHOICE QUESTION
5 mins • 5 pts
A public key algorithm that does both encryption and digital signature is which of the following?
RSA
AES
3DES
SHA
3.
MULTIPLE CHOICE QUESTION
5 mins • 5 pts
Which of the following was developed by the National Computer Security Center (NCSC) for the US Department of Defense?
TCSEC
ITSEC
ICC
ISO 27001
4.
MULTIPLE CHOICE QUESTION
5 mins • 5 pts
Which of the following statements relating to the Bell-LaPadula security model is FALSE?
A subject is not allowed to read up.
The property restriction can be escaped by temporarily downgrading a high level subject.
A subject is not allowed to read down.
It is restricted to confidentiality.
5.
MULTIPLE CHOICE QUESTION
5 mins • 5 pts
Which of the following is a class A fire?
common combustibles
liquid
electrical
Halon
6.
MULTIPLE CHOICE QUESTION
5 mins • 5 pts
Which of the following questions is less likely to help in assessing physical and environmental protection?
Are entry codes changed periodically?
Are appropriate fire suppression and prevention devices installed and working?data transmission lines controlled?
Are there processes to ensure that unauthorized individuals cannot read, copy, alter, or steal printed or electronic information?
Is physical access to data transmission lines controlled?
7.
MULTIPLE CHOICE QUESTION
5 mins • 5 pts
Which security model introduces access to objects only through programs?
The Biba model
The Bell-LaPadula model
The Clark-Wilson model
The information flow model
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?