IT279 CISSP II Unit 1 Assignment (Purdue university)
IT 279 UNIT 1 ASSIGNMENT 2 1. Which statement is true of complex instruction set computers (CISC)? A. An instruction set executes a single low-level operation. B. The access calls to main memory are fewer as compared to RISC. C. The instruction set supports all the low-level programming languages. “The CISC architecture contains a large set of computer instructions that range from very simple to very complex and specialized. Thought the design was intended to compute complex instructions in the most efficient way, it was later found that many small, short instructions could compute complex instructions more efficiently”, according to TechTerms [ CITATION CIS l 1033 ]. 2. What is the best description of reduced instruction set computing (RISC)? A. Processing that executes one instruction at a time B. Computing using instructions that perform many operations per instruction C. Computing using instructions that are simpler and require fewer clock cycles to execute “RISC processors only use simple instructions that can be executed within one clock cycle. In order to perform the exact series of steps described in the CISC approach, a programmer would need to code four lines of assembly”, according to Stanford[ CITATION RIS l 1033 ]. 3. Memory space that is insulated from other running processes in a multipurpose system is part of a _________. A. Security perimeter B. Protection domain C. Trusted path “The security perimeter of your system is an imaginary boundary that separates the TCB from the reset of the system. This boundary ensures that no insecure communications or interactions occur between the TCB and the remaining elements of the computer system”, according to the CISSP: Certified Information Systems Security Professional Official Study Guide [CITATION Cha18 p 283 l 1033 ]. 4. What is the best description of an execution domain? A. Memory space insulated from other running processes in a multiprocessing system. B. A communication channel between an application and the kernel in the TCB. C. An isolated area that is used by trusted processes when they are run in privileged state. “A program that resides in a privileged domain needs to be able to execute its instructions and process its data with the assurance that programs in a different domain cannot negatively affect
Written for
- Institution
- IT 279
- Course
- IT 279
Document information
- Uploaded on
- October 17, 2023
- Number of pages
- 7
- Written in
- 2023/2024
- Type
- OTHER
- Person
- Unknown
Subjects
-
it279 cissp ii unit 1 assignment purdue universit