CISSP - Question Bank 11
Test your knowledge of CISSP with these multiple choice questions. Each Question Bank includes 20 practice questions that have been designed to measure your knowledge of key ideas.
A key factor to keep in mind is that guessing is better than not answering a question.
Every single question on the CISSP exam is a four-option multiple choice question with a single correct answer. Some are straightforward, such as asking you to select a definition. Some are a bit more involved, such as asking you to select the appropriate concept or best practice. And some questions present you with a scenario or situation and ask you to select the best response.
StartQ1. Many PC operating systems provide functionality that enables them to support the simultaneous execution of multiple applications on single-processor systems. What term is used to describe this capability?
A. Multiprogramming
B. Multithreading
C. Multitasking
D. Multiprocessing
Q2. Which one of the following devices is most susceptible to TEMPEST monitoring of its emanations?
A. Floppy drive
B. Monitor
C. CD-ROM
D. Keyboard
Q3. You have three applications running on a single-processor system that supports multitasking. One of those applications is a word processing program that is managing two threads simultaneously. The other two applications are using only one thread of execution. How many application threads are running on the processor at any given time?
A. 1
B. 2
C. 3
D. 4
Q4. What type of federal government computing system requires that all individuals accessing the system have a need-to-know all of the information processed by that system?
A. Dedicated
B. System high
C. Compartmented
D. Multilevel
Q5. What term describes the processor mode used to run the system tools used by administrators seeking to make configuration changes to a machine?
A. User mode
B. Supervisory mode
C. Kernel mode
D. Privileged mode
Q6. What type of memory chip allows the end user to write information to the memory only one time and then preserves that information indefinitely without the possibility of erasure?
A. ROM
B. PROM
C. EPROM
D. EEPROM
Q7. Which type of memory chip can be erased only when it is removed from the computer and exposed to a special type of ultraviolet light?
A. ROM
B. PROM
C. EPROM
D. EEPROM
Q8. Which one of the following types of memory might retain information after being removed from a computer and, therefore, represent a security risk?
A. Static RAM
B. Dynamic RAM
C. Secondary memory
D. Real memory
Q9. What is the single largest security threat RAM chips pose to your organization?
A. Data retention
B. Fire
C. Theft
D. Electronic emanations
Q10. What type of electrical component serves as the primary building block for dynamic RAM chips?
A. Capacitor
B. Resistor
C. Flip-flop
D. Transistor
Q11. Which one of the following storage devices is most likely to require encryption technology in order to maintain data security in a networked environment?
A. Hard disk
B. Backup tape
C. Floppy disk
D. RAM
Q12. In which of the following security modes can you be assured that all users have access permissions for all information processed by the system but will not necessarily have a need-to-know all of that information?
A. Dedicated
B. System high
C. Compartmented
D. Multilevel
Q13. Which one of the following security modes does not require that all users have a security clearance for the highest level of information processed by the system?
A. Dedicated
B. System high
C. Compartmented
D. Multilevel
Q14. What type of memory device is normally used to contain a computer’s BIOS?
A. PROM
B. EEPROM
C. ROM
D. EPROM
Q15. What type of memory is directly available to the CPU and does not need to be loaded?
A. RAM
B. ROM
C. Register memory
D. Virtual memory
Q16. In what type of addressing scheme is the data actually supplied to the CPU as an argument to the instruction?
A. Direct addressing
B. Immediate addressing
C. Base+Offset addressing
D. Indirect addressing
Q17. What type of addressing scheme supplies the CPU with a location that contains the memory address of the actual operand?
A. Direct addressing
B. Immediate addressing
C. Base+Offset addressing
D. Indirect addressing
Q18. What security principle helps prevent users from accessing memory spaces assigned to applications being run by other users?
A. Separation of privilege
B. Layering
C. Process isolation
D. Least privilege
Q19. Which security principle mandates that only a minimum number of operating system processes should run in supervisory mode?
A. Abstraction
B. Layering
C. Data hiding
D. Least privilege
Q20. Which security principle takes the concept of process isolation and implements it using physical controls?
A. Hardware segmentation
B. Data hiding
C. Layering
D. Abstraction
- Question Bank 00
- Question Bank 01
- Question Bank 02
- Question Bank 03
- Question Bank 04
- Question Bank 05
- Question Bank 06
- Question Bank 07
- Question Bank 08
- Question Bank 09
- Question Bank 10
- Question Bank 11
- Question Bank 12
- Question Bank 13
- Question Bank 14
- Question Bank 15
- Question Bank 16
- Question Bank 17
- Question Bank 18
- Question Bank 19