CS201 Week 4

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Intrusion detection is an example of a strategy for improving system survivability based on knowledge gained from intrusions.

False

Partial network encryption, also called communications encryption, is the most extreme form of encryption.

False

Some viruses are considered to be benign.

False

The File Manager responds to the CREATE command by creating a new file.

False

Although noncontiguous allocation schemes eliminate external storage fragmentation and the need for compaction, they don't support direct access because there's no easy way to determine the exact location of a specific record.

True

In public/private key encryption, the private key is a pair of two prime numbers chosen by the person who wants to receive a private message.

True

When nonsynchronized processes access data records and modify some but not all of a record's fields, it is called "accidental incomplete modification of data."

True

The computer system ____ a file by activating the appropriate secondary storage device and loading the file into memory while updating its records of who is using that file.

allocates

When using indexed sequential record organization, each entry in the index file contains the ____ and the physical location of the data block where this record, and the records with smaller keys, are stored.

highest record key

When data is stored in fixed length fields, data that extends beyond the fixed size ____.

is truncated

One major disadvantage of encryption is that ____.

it increases the system's overhead

Two methods of active wiretapping are "between lines transmission" and "____."

piggyback entry

On magnetic disks, files can be organized in one of three ways: ____.

sequential, direct, or indexed sequential

Although a user directory is treated as a file, it is flagged to indicate to the File Manager that this file is really a ____ whose records are filenames that point to files.

subdirectory

Errors can occur when data values are incorrectly stored because the field isn't large enough to hold the numeric value stored there. This issue is an example of a(n) ____.

unintentional attack

A relative filename is a name that is selected by the File Manager when the file is created.

False

The formula for computing the current byte address (CBA) for a direct access file with fixed record length is ____.

CBA = (RN - 1) * RL

____ is a form of social engineering whereby an intruder pretends to be a legitimate entity and contacts unwary users asking them to reconfirm their personal and/or financial information.

Phishing

A subdirectory is created when a user opens an account to access the computer system.

True

The primary disadvantage of contiguous storage is that ____.

a file can't be expanded unless there is empty space available immediately following it


Kaugnay na mga set ng pag-aaral

Life Insurance Chapter 5 Annuities

View Set

Fluid & Electrolytes HURST REVIEW

View Set

Social Media: Listening and Monitoring

View Set

The Princeton Trilogy--Katz and Braley (1933), Gilbert (1951), Karlins et al. (1969)

View Set