Page 670 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 670
the system but will not necessarily need to know of all that
information?
A. Dedicated
B. System high
C. Compartmented
D. Multilevel
13. The most commonly overlooked aspect of mobile phone
eavesdropping is related to which of the following?
A. Storage device encryption
B. Screen locks
C. Overhearing conversations
D. Wireless networking
14. What type of memory device is usually used to contain a
computer’s motherboard BIOS?
A. PROM
B. EEPROM
C. ROM
D. EPROM
15. What type of memory is directly available to the CPU and is often
part of the CPU?
A. RAM
B. ROM
C. Register memory
D. Virtual memory
16. You are the IT security manager for a retail merchant organization
that is just going online with an e-commerce website. You hired
several programmers to craft the code that is the backbone of your
new web sales system. However, you are concerned that while the

