13. c.
The proof-of-correspondence deals with verifying the design between a formal model and the functional specifications. A proof-of-wholeness is having all of an object’s parts or components include both the sense of unimpaired condition (i.e., soundness) and being complete and undivided (i.e., completeness). It applies to preserving the integrity of objects in that different layers of abstraction for objects cannot be penetrated, and their internal mechanisms cannot be modified or destroyed. A proof-of-origin is the basis to prove an assertion. For example, a private signature key is used to generate digital signatures as a proof-of-origin. A proof-of-correctness applies mathematical proofs-of-correctness to demonstrate that a computer program conforms exactly to its specifications and to prove that the functions of the computer programs are correct. 14. Regarding cryptographic modules, the implementation of a trusted channel protects which of the following?
1.
Plaintext critical security parameters2.
Cryptographic module software3.
Use of untrusted software4.
Spoofing by a remote systema.
1 and 2b.
1 and 3c.
3 and 4d.
1, 2, 3, and 414. d.
The implementation of a trusted channel protects plaintext critical security parameters (CSPs) and the software of the cryptographic module from other untrusted software that may be executing on the system. The trusted channel also protects from spoofing by a remote system. 15. For cryptographic modules, additional life-cycle assurance is provided through which of the following?
1.
Automated configuration management2.
Detailed design3.
Low-level testing4.
Operator authenticationa.
1 and 2b.
2 and 3c.
3 and 4d.
1, 2, 3, and 415. d.
For cryptographic modules, additional life-cycle assurance is provided through automated configuration management, detailed design, low-level testing, and operator authentication using vendor-provided authentication information.16. From a security risk viewpoint, which of the following situations is
not acceptable?a.
Fail in a known stateb.
Return to an operational statec.
Fail in a safe but unknown stated.
Restore to a secure state16. c.
It is not good to assume that an unknown state is safe until proven because it is risky. The other three choices are examples of acceptable situations because of little or no risk. 17. Memory protection is achieved through which of the following?
1.
System partitioning2.
Nonmodifiable executable programs3.
Resource isolation4.
Domain separationa.
1 and 2b.
1 and 4c.
3 and 4d.
1, 2, 3, and 417. d.
Memory protection is achieved through the use of system partitioning, nonmodifiable executable programs, resource isolation, and domain separation. Inadequate protection of memory leads to many security breaches through the operating system and applications.18. Organizations should
not design which of the following?a.
Operating system-independent application systemsb.
Virtualization techniquesc.
Operating system-dependent applicationsd.
Virtualized networking18. c.
Organizations should design operating system-independent application systems because they can run on multiple operating system platforms. Such applications provide portability and reconstitution on different platform architectures, increasing the availability or critical functionality while operating system-dependent application systems are under attack. Virtualization techniques provide the ability to disguise information systems, potentially reducing the likelihood of successful attacks without the cost of having multiple platforms. Virtualized networking is a part of virtualization techniques.19. Typically, computer architecture does
not cover which of the following?a.
Operating systemsb.
Business application systemsc.
Computer memory chipsd.
Hardware circuits19. b.
Computer architecture covers operating systems, computer memory chips, and hardware circuits to make the computer run. However, it does not cover business application systems because they are required to perform a business task or function. Business application systems by themselves do not make the computer run. 20. A trusted channel can be realized in which of the following ways?
1.
A communication pathway between the cryptographic module and the local endpoints2.
A cryptographic mechanism that does not allow misuse of transitory sensitive security parameters (SSPs)