Skip survey header

CISSP Practice Quiz: Domain 3: Security Architecture and Engineering Quiz 2

CISSP Practice Quiz: Domain 3: Security Architecture and Engineering Quiz 2

1. Peter detected a SQL injection vulnerability in one of his organization’s applications. Which one of the following controls is not a reasonable way to address this vulnerability?
2. Gina is sending an encrypted message to her colleague, Eric. She would like to ensure that the message is confidential and also that Eric can prove that the message came from her. Therefore, she would like to both encrypt the message content and apply a digital signature to the message.

What goal of cryptography is Gina seeking to achieve by applying the digital signature?
3. Gina is sending an encrypted message to her colleague, Eric. She would like to ensure that the message is confidential and also that Eric can prove that the message came from her. Therefore, she would like to both encrypt the message content and apply a digital signature to the message.

Which one of the following functions might Gina use to securely create a message digest for use in the digital signature process?
4. Gina is sending an encrypted message to her colleague, Eric. She would like to ensure that the message is confidential and also that Eric can prove that the message came from her. Therefore, she would like to both encrypt the message content and apply a digital signature to the message.

What key should Gina use to encrypt the message payload?
5. Gina is sending an encrypted message to her colleague, Eric. She would like to ensure that the message is confidential and also that Eric can prove that the message came from her. Therefore, she would like to both encrypt the message content and apply a digital signature to the message.

What key should Gina use to create the digital signature?
6. What security model property says that an individual should not be able to read an object at a lower security level than his or her own level?
7. In systems that use the ring protection model, which ring contains the operating system kernel?
8. Vincent is concerned about VM escape attacks. What component is responsible for preventing this type of attack?
9. What key is used by a web browser when verifying the digital certificate presented by a website?
10. Gina is sending an encrypted message to her colleague, Eric. She would like to ensure that the message is confidential and also that Eric can prove that the message came from her. Therefore, she would like to both encrypt the message content and apply a digital signature to the message.

What key should Eric use to validate the digital signature?