Official (ISC)² CISSP - Domain 3:
Security Architecture and Engineering
Exam 2026 Questions and Answers
Algorithm - Correct answer-A mathematical function that is used in the encryption
and decryption processes.
Asymmetric - Correct answer-Not identical on both sides. In cryptography,
key pairs are used, one to encrypt, the other
to decrypt.
Availability - Correct answer-Ensuring timely and reliable access to and use of
information by authorized users.
Certificate authority (CA) - Correct answer-An entity trusted by one or more users
as an authority in a network that issues, revokes, and manages digital certificates to
bind
individuals and entities to their public keys.
©COPYRIGHT 2025, ALL RIGHTS RESERVED 1
, CIA/AIC Triad - Correct answer-Security model with the three security concepts of
confidentiality, integrity, and availability make up the CIA Triad. It is also
sometimes referred to as the AIC Triad.
Ciphertext - Correct answer-The altered form of a plaintext message, so as to be
unreadable for anyone except the intended recipients. Something that has been
turned into a secret.
Confidentiality - Correct answer-Preserving authorized restrictions on information
access and disclosure, including means for protecting personal privacy and
proprietary information.
Confusion - Correct answer-Provided by mixing (changing) the key values used
during the repeated rounds of encryption. When the key is modified for each
round, it provides added complexity that the attacker would encounter.
Cryptanalysis - Correct answer-The study of techniques for attempting to defeat
cryptographic techniques and, more generally, information security services
provided through cryptography.
Cryptology - Correct answer-The science that deals with hidden, disguised, or
encrypted communications.
©COPYRIGHT 2025, ALL RIGHTS RESERVED 2
Security Architecture and Engineering
Exam 2026 Questions and Answers
Algorithm - Correct answer-A mathematical function that is used in the encryption
and decryption processes.
Asymmetric - Correct answer-Not identical on both sides. In cryptography,
key pairs are used, one to encrypt, the other
to decrypt.
Availability - Correct answer-Ensuring timely and reliable access to and use of
information by authorized users.
Certificate authority (CA) - Correct answer-An entity trusted by one or more users
as an authority in a network that issues, revokes, and manages digital certificates to
bind
individuals and entities to their public keys.
©COPYRIGHT 2025, ALL RIGHTS RESERVED 1
, CIA/AIC Triad - Correct answer-Security model with the three security concepts of
confidentiality, integrity, and availability make up the CIA Triad. It is also
sometimes referred to as the AIC Triad.
Ciphertext - Correct answer-The altered form of a plaintext message, so as to be
unreadable for anyone except the intended recipients. Something that has been
turned into a secret.
Confidentiality - Correct answer-Preserving authorized restrictions on information
access and disclosure, including means for protecting personal privacy and
proprietary information.
Confusion - Correct answer-Provided by mixing (changing) the key values used
during the repeated rounds of encryption. When the key is modified for each
round, it provides added complexity that the attacker would encounter.
Cryptanalysis - Correct answer-The study of techniques for attempting to defeat
cryptographic techniques and, more generally, information security services
provided through cryptography.
Cryptology - Correct answer-The science that deals with hidden, disguised, or
encrypted communications.
©COPYRIGHT 2025, ALL RIGHTS RESERVED 2