Page 1533 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1533
and paid for by a group of users or organizations for their shared
benefit, such as collaboration and data exchange. A private cloud is
a cloud service within a corporate network and isolated from the
internet. A public cloud is a cloud service that is accessible to the
general public typically over an internet connection. A hybrid cloud
is a cloud service that is partially hosted within an organization for
private use and that uses external services to offer recourses to
outsiders.
7. D. An embedded system is a computer implemented as part of a
larger system. The embedded system is typically designed around a
limited set of specific functions in relation to the larger product of
which it’s a component. It may consist of the same components
found in a typical computer system, or it may be a microcontroller.
8. C. Secondary memory is a term used to describe magnetic, optical,
or flash media. These devices will retain their contents after being
removed from the computer and may later be read by another user.
9. B. The risk of a lost or stolen notebook is the data loss, not the loss
of the system itself. Thus, keeping minimal sensitive data on the
system is the only way to reduce the risk. Hard drive encryption,
cable locks, and strong passwords, although good ideas, are
preventive tools, not means of reducing risk. They don’t keep
intentional and malicious data compromise from occurring;
instead, they encourage honest people to stay honest.
10. A. Dynamic RAM chips are built from a large number of capacitors,
each of which holds a single electrical charge. These capacitors
must be continually refreshed by the CPU in order to retain their
contents. The data stored in the chip is lost when power is
removed.
11. C. Removable drives are easily taken out of their authorized
physical location, and it is often not possible to apply operating
system access controls to them. Therefore, encryption is often the
only security measure short of physical security that can be
afforded to them. Backup tapes are most often well controlled
through physical security measures. Hard disks and RAM chips are
often secured through operating system access controls.

