Search Header Logo

CISSP Domain 3

Authored by Miftah Rahman

Computers

Professional Development

Used 15+ times

CISSP Domain 3
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

The Secure Hash Algorithm (SHA-1) creates:

a fixed length message digest from a fixed length input message

a variable length message digest from a variable length input message

a fixed length message digest from a variable length input message

a variable length message digest from a fixed length input message

2.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

A public key algorithm that does both encryption and digital signature is which of the following?

RSA

AES

3DES

SHA

3.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

Which of the following was developed by the National Computer Security Center (NCSC) for the US Department of Defense?

TCSEC

ITSEC

ICC

ISO 27001

4.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

Which of the following statements relating to the Bell-LaPadula security model is FALSE?

A subject is not allowed to read up.

The property restriction can be escaped by temporarily downgrading a high level subject.

A subject is not allowed to read down.

It is restricted to confidentiality.

5.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

Which of the following is a class A fire?

common combustibles

liquid

electrical

Halon

6.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

Which of the following questions is less likely to help in assessing physical and environmental protection?

Are entry codes changed periodically?

Are appropriate fire suppression and prevention devices installed and working?data transmission lines controlled?

Are there processes to ensure that unauthorized individuals cannot read, copy, alter, or steal printed or electronic information?

Is physical access to data transmission lines controlled?

7.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

Which security model introduces access to objects only through programs?

The Biba model

The Bell-LaPadula model

The Clark-Wilson model

The information flow model

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?