Page 1532 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1532

Chapter 9: Security Vulnerabilities, Threats,

               and Countermeasures




                1.  C. Multitasking is processing more than one task at the same time.
                    In most cases, multitasking is simulated by the operating system

                    even when not supported by the processor.

                2.  B. Mobile device management (MDM) is a software solution to the
                    challenging task of managing the myriad mobile devices that
                    employees use to access company resources. The goals of MDM are
                    to improve security, provide monitoring, enable remote
                    management, and support troubleshooting. Not all mobile devices
                    support removable storage, and even fewer support encrypted

                    removable storage. Geotagging is used to mark photos and social
                    network posts, not for BYOD management. Application
                    whitelisting may be an element of BYOD management but is only
                    part of a full MDM solution.

                3.  A. A single-processor system can operate on only one thread at a
                    time. There would be a total of four application threads (ignoring
                    any threads created by the operating system), but the operating

                    system would be responsible for deciding which single thread is
                    running on the processor at any given time.

                4.  A. In a dedicated system, all users must have a valid security
                    clearance for the highest level of information processed by the
                    system, they must have access approval for all information
                    processed by the system, and they must have a valid need to know
                    of all information processed by the system.


                5.  C. Because an embedded system is in control of a mechanism in the
                    physical world, a security breach could cause harm to people and
                    property. This typically is not true of a standard PC. Power loss,
                    internet access, and software flaws are security risks of both
                    embedded systems and standard PCs.

                6.  A. A community cloud is a cloud environment maintained, used,
   1527   1528   1529   1530   1531   1532   1533   1534   1535   1536   1537