Page 669 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 669
8. Which one of the following types of memory might retain
information after being removed from a computer and, therefore,
represent a security risk?
A. Static RAM
B. Dynamic RAM
C. Secondary memory
D. Real memory
9. What is the most effective means of reducing the risk of losing the
data on a mobile device, such as a notebook computer?
A. Defining a strong logon password
B. Minimizing sensitive data stored on the mobile device
C. Using a cable lock
D. Encrypting the hard drive
10. What type of electrical component serves as the primary building
block for dynamic RAM chips?
A. Capacitor
B. Resistor
C. Flip-flop
D. Transistor
11. Which one of the following storage devices is most likely to require
encryption technology in order to maintain data security in a
networked environment?
A. Hard disk
B. Backup tape
C. Removable drives
D. RAM
12. In which of the following security modes can you be assured that
all users have access permissions for all information processed by

