Page 1532 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1532
Chapter 9: Security Vulnerabilities, Threats,
and Countermeasures
1. C. Multitasking is processing more than one task at the same time.
In most cases, multitasking is simulated by the operating system
even when not supported by the processor.
2. B. Mobile device management (MDM) is a software solution to the
challenging task of managing the myriad mobile devices that
employees use to access company resources. The goals of MDM are
to improve security, provide monitoring, enable remote
management, and support troubleshooting. Not all mobile devices
support removable storage, and even fewer support encrypted
removable storage. Geotagging is used to mark photos and social
network posts, not for BYOD management. Application
whitelisting may be an element of BYOD management but is only
part of a full MDM solution.
3. A. A single-processor system can operate on only one thread at a
time. There would be a total of four application threads (ignoring
any threads created by the operating system), but the operating
system would be responsible for deciding which single thread is
running on the processor at any given time.
4. A. In a dedicated system, all users must have a valid security
clearance for the highest level of information processed by the
system, they must have access approval for all information
processed by the system, and they must have a valid need to know
of all information processed by the system.
5. C. Because an embedded system is in control of a mechanism in the
physical world, a security breach could cause harm to people and
property. This typically is not true of a standard PC. Power loss,
internet access, and software flaws are security risks of both
embedded systems and standard PCs.
6. A. A community cloud is a cloud environment maintained, used,

