Skip to main content

Security Architecture & Engineering

Domain 01 Practice Set: 01

CISSP DOMAIN 03: Security Architecture & Engineering (Assessment Mode)

  CISSP Domain 3: These questions aim to test your understanding of critical security concepts and technologies involved in securing information and systems, aligning with the objectives of Domain 3 of the CISSP exam

Domain 03: Practice Set 01

Disclaimer: The practice exam questions provided are representative of the certification exam, but not the actual questions you will see on the certification exam. Practice exams are for self-assessment.

Page : 1/10

1. Which of the following best describes the main goal of Mandatory Access Control (MAC)?
2. In secure software development, what is the significance of input validation?
3. Which statement best describes the role of Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols?
4. Which of the following best describes the concept of a "root of trust"?
5. What is the primary security concern addressed by input validation in software applications?

Page : 2/10

6. What role does "Separation of Duties" play in information security?
7. Which security model is primarily concerned with ensuring that actions are taken in a series of steps that maintain a secure state?
8. What is the main purpose of employing a WAF (Web Application Firewall)?
9. What is the primary function of a digital signature?
10. What is the primary purpose of a Data Loss Prevention (DLP) system?

Page : 3/10

11. Which of the following encryption methods is used to secure data in transit and is based on a system where each party involved has a pair of cryptographic keys consisting of a public key and a private key?
12. What is the primary purpose of a Public Key Infrastructure (PKI)?
13. What principle is enforced by the use of mandatory access control (MAC) models?
14. What is the primary function of the Trusted Platform Module (TPM) in computer security?
15. What is the main purpose of implementing a Sandboxing technique in software development?

Page : 4/10

16. What is the main difference between hashing and encryption?
17. In cryptography, what is the main purpose of using a nonce?
18. Which of the following is a characteristic of the Biba integrity model?
19. Which of the following encryption algorithms is considered asymmetric?
20. Which of the following security models is specifically designed to prevent conflict of interest when accessing data?

Page : 5/10

21. Which of the following security capabilities is most directly associated with preventing eavesdropping on network communications?
22. What role does an intrusion detection system (IDS) play in a security architecture?
23. What is the primary difference between symmetric and asymmetric encryption?
24. What is the primary function of a Trusted Platform Module (TPM) in a computing device?
25. Which type of access control model is based on the classification of data and clearance levels of users?

Page : 6/10

26. What is the primary purpose of employing containerization in application deployment?
27. Which principle of secure design emphasizes the need for a system to continue operating correctly even when components fail?
28. Which of the following best describes the purpose of a hardware security module (HSM)?
29. What is the primary function of a Security Information and Event Management (SIEM) system?
30. Which of the following best describes the concept of "defense in depth"?

Page : 7/10

31. Which of the following best describes the purpose of Security Assertion Markup Language (SAML)?
32. Which of the following scenarios is an example of a Man-in-the-Middle (MitM) attack?
33. What is the primary security concern addressed by implementing an air gap in a network?
34. What does a Public Key Infrastructure (PKI) primarily support?
35. What is a primary security concern that can be mitigated by using secure coding practices?

Page : 8/10

36. What principle is primarily enforced by the Clark-Wilson model?
37. Which of the following best describes the concept of "data at rest" encryption?
38. In the context of secure software development, what is the primary goal of threat modeling?
39. Which of the following best describes a Zero Trust architecture?
40. In the context of Public Key Infrastructure (PKI), what role does a Certificate Authority (CA) play?

Page : 9/10

41. What is the main goal of employing steganography in cybersecurity?
42. What security mechanism can be used to detect unauthorized changes to software and data?
43. Which mechanism is commonly used in operating systems to segregate the memory space used by different applications?
44. What does the concept of "Fail Secure" entail in security systems?
45. Which concept is essential for ensuring that a system can enforce and verify a security policy on data it processes?

Page : 10/10

46. What is the function of a Certificate Authority (CA) in a Public Key Infrastructure (PKI)?
47. Which of the following is a primary security concern with virtualization technology?
48. What is the primary purpose of using hardware security modules (HSMs) in a network infrastructure?
49. Which security model is primarily focused on ensuring that access controls are implemented correctly to keep data confidential?
50. In the context of secure architecture, what is the main goal of a demilitarized zone (DMZ)?
CISSP Practice Test, Quiz & Flashcards

More practice question and flash cards

Risk & Security Management

Domain_01_CISSP Practice Set 01

Asset Security

Domain_02_CISSP Practice Set 01

Security Architecture & Engineering

Domain_03_CISSP Practice Set 01

Communication & Network Security

Domain_04_CISSP Practice Set 01

Identity & Access Management

Domain_05_CISSP Practice Set 01

Domain 03: Mindmaps, Flashcards and more…

Learn More

CISSP Practice Sets Status

CISSP practice sets and Questions counter

5

CISSP Practice Sets

250

Questions

5.8

Test Submited by Users