Page 1533 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1533

and paid for by a group of users or organizations for their shared
                    benefit, such as collaboration and data exchange. A private cloud is

                    a cloud service within a corporate network and isolated from the
                    internet. A public cloud is a cloud service that is accessible to the
                    general public typically over an internet connection. A hybrid cloud
                    is a cloud service that is partially hosted within an organization for
                    private use and that uses external services to offer recourses to
                    outsiders.


                7.  D. An embedded system is a computer implemented as part of a
                    larger system. The embedded system is typically designed around a
                    limited set of specific functions in relation to the larger product of
                    which it’s a component. It may consist of the same components
                    found in a typical computer system, or it may be a microcontroller.

                8.  C. Secondary memory is a term used to describe magnetic, optical,
                    or flash media. These devices will retain their contents after being

                    removed from the computer and may later be read by another user.

                9.  B. The risk of a lost or stolen notebook is the data loss, not the loss
                    of the system itself. Thus, keeping minimal sensitive data on the
                    system is the only way to reduce the risk. Hard drive encryption,
                    cable locks, and strong passwords, although good ideas, are
                    preventive tools, not means of reducing risk. They don’t keep
                    intentional and malicious data compromise from occurring;

                    instead, they encourage honest people to stay honest.

              10.  A. Dynamic RAM chips are built from a large number of capacitors,
                    each of which holds a single electrical charge. These capacitors
                    must be continually refreshed by the CPU in order to retain their
                    contents. The data stored in the chip is lost when power is
                    removed.

               11.  C. Removable drives are easily taken out of their authorized
                    physical location, and it is often not possible to apply operating

                    system access controls to them. Therefore, encryption is often the
                    only security measure short of physical security that can be
                    afforded to them. Backup tapes are most often well controlled
                    through physical security measures. Hard disks and RAM chips are
                    often secured through operating system access controls.
   1528   1529   1530   1531   1532   1533   1534   1535   1536   1537   1538