Page 670 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 670

the system but will not necessarily need to know of all that
                    information?

                    A.  Dedicated


                    B.  System high

                    C.  Compartmented

                    D.  Multilevel

               13.  The most commonly overlooked aspect of mobile phone
                    eavesdropping is related to which of the following?

                    A.  Storage device encryption

                    B.  Screen locks

                    C.  Overhearing conversations

                    D.  Wireless networking

               14.  What type of memory device is usually used to contain a

                    computer’s motherboard BIOS?

                    A.  PROM

                    B.  EEPROM

                    C.  ROM

                    D.  EPROM

               15.  What type of memory is directly available to the CPU and is often
                    part of the CPU?

                    A.  RAM

                    B.  ROM


                    C.  Register memory

                    D.  Virtual memory

               16.  You are the IT security manager for a retail merchant organization
                    that is just going online with an e-commerce website. You hired
                    several programmers to craft the code that is the backbone of your
                    new web sales system. However, you are concerned that while the
   665   666   667   668   669   670   671   672   673   674   675