Taken from Cert-CAPM3ED
Related Exam: PMI Cert-CAPM3ED PMCert: Certified Associate in Project Management Third Edition
Item Number: Cert-CAPM3ED.6.15.1
Which information would it be appropriate to include in the risk management plan?
Previous question and answer:
Taken from Cert-CISSP
Related Exam: ISC2 Cert-CISSP SecurityCert: CISSP
Item Number: Cert-CISSP.6.4.3
What is the best description of cache memory?
- Cache memory is memory that is used for high-speed transfer of data. Data in cache can be accessed by the CPU more quickly than data located in random access memory (RAM).
Read-only memory (ROM) is non-volatile memory that holds its contents even during power outages.
Flash memory is special memory that is used in portable devices.
RAM is volatile memory that loses its contents during power outages.
For testing purposes, you need to understand the relation between the computer bus, primary storage, secondary storage, and memory. The computer bus is a group of conductors for the addressing of data and control. Most computers contain the following three types of buses:
Primary storage is memory directly addressable by the CPU, which is for the storage of instructions and data associated with the program being executed. Secondary storage is memory, such as magnetic disks, that provides non-volatile storage. Virtual memory is secondary storage memory used in conjunction with real memory to present a CPU with a larger, apparent address space.
- Address bus - a hardwired connection between the CPU and RAM chips. It carries information on which device is communicating with the CPU.
- Data bus - the area in which the data that is being used by the CPU resides. It carries the actual data being processed.
- Control bus - the connection between the CPU and other devices. It carries commands from the CPU and returns status signals from the devices.
The memory hierarchy in a typical computer is as follows: CPU, cache, primary memory, and secondary memory.
Firmware is a type of software that is held in a ROM or EROM chip. It allows the computer to communicate with some type of peripheral device. The system's BIOS instructions are also held in firmware on the motherboard. In most situations, firmware cannot be modified unless someone has physical access to the system. This is different from other types of software that may be modified remotely or through logical means.
- CISSP All-in-One Exam Guide, Chapter 5: Security Architecture and Design, The Central Processing Unit, Memory Types, pp. 300-308