Page 669 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 669

8.  Which one of the following types of memory might retain
                    information after being removed from a computer and, therefore,

                    represent a security risk?

                    A.  Static RAM

                    B.  Dynamic RAM

                    C.  Secondary memory

                    D.  Real memory

                9.  What is the most effective means of reducing the risk of losing the
                    data on a mobile device, such as a notebook computer?

                    A.  Defining a strong logon password

                    B.  Minimizing sensitive data stored on the mobile device

                    C.  Using a cable lock


                    D.  Encrypting the hard drive

              10.  What type of electrical component serves as the primary building
                    block for dynamic RAM chips?

                    A.  Capacitor

                    B.  Resistor

                    C.  Flip-flop

                    D.  Transistor

               11.  Which one of the following storage devices is most likely to require
                    encryption technology in order to maintain data security in a

                    networked environment?

                    A.  Hard disk

                    B.  Backup tape

                    C.  Removable drives

                    D.  RAM

               12.  In which of the following security modes can you be assured that
                    all users have access permissions for all information processed by
   664   665   666   667   668   669   670   671   672   673   674