CISS: Operating Systems 301 Final Study Guide

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

______________ refers to a resource measurement tool that indicates the likelihood that the resource will be ready when a user needs it and is influenced by mean between failures and mean time to repair.

Availability

In a file management system, information is passed from the Device Manager at the top of the hierarchy to the File Manager at the bottom. True / False

False

Some viruses are considered to be benign True / False

False

System efficiency is affected primarily by two major components: user programs and operating system programs. True / False

False

The location of a volume's directory on the disk does not make a difference in the time it takes to access it. True / False

False

Wiretapping involves the capability of authorized users to search through storage, directories, or files for private information. True / False

False

The IEEE and the Association for Computing Machinery (ACM) issued a standard of ethics for the global computing community in 1977. True / False

False (1992)

Each kernel is operated by the application software which, in turn, is directed by the kernel running on the host computer. True / False

False (Each kernel is operated by the DO/S, which, in turn, is directed by the application software running on the host computer.)

If a process requests access to a region in memory, the process manager determines whether the requesting process has been previously granted rights. True / False

False (If a process requests access to a region in memory, the capability manager first determines whether the requesting process has been previously granted rights.)

Intrusion detection is an example of a strategy for improving system survivability based on knowledge gained from intrusions. True / False

False (Intrusion recognition patterns)

The distributed operating system (DO/S) was developed before the network operating system (NOS). True / False

False (NOS was developed first.)

Networks were created initially to share data. True / False

False (Networks were created initially to share expensive hardware resources such as large mainframes, centralized high-speed printers, and sizable hard disks.)

Execute-only access allows users to read the page; however, they are not allowed to modify it. True / False

False (Read-only)

Partial network encryption, also called communications encryption, is the most extreme form of encryption. True / False

False (Total network encryption)

_________________ is a resource measurement tool defined as the average time needed to fix a failed unit and put it back in service.

Mean time to repair (MTTR)

_____________ engineering is a technique whereby system intruders gain access to information about a legitimate user to learn active passwords, sometimes by calling the user and posing as a system technician.

Social

______________ is a security threat that relies on clear text transmission, whereby assailant falsifies the IP addresses of an Internet server by changing the address recorded in packets it sends over the Internet.

Spoofing

A DO/S must keep a global accounting of each network device and its availability, maintain each device's status record and control block, and distribute this information to all sites. True / False

True

A continuing series of security awareness and ethics communications to computer users is more effective than a single announcement. True / False

True

A field is a group of related records that can be identified by the user with a name, type, and size. True / False

True

A logic bomb often spreads unnoticed throughout a network until a predetermined event, when it goes off and does its damage. True / False

True

A single computer without access to e-mail or the Internet is easy to protect and has a low risk of attack. True / False

True

Any system improvement can be made only after extensive analysis of the needs of the system's resources, requirements, managers, and users. True / False

True

Benchmarks are often used by vendors to demonstrate to prospective clients the specific advantages of a new CPU, operating system, compiler, or piece of hardware. True / False

True

Data redundancy can make files much faster and easier to read. True / False

True

Default passwords pose unique vulnerabilities because they are widely known among system attackers but are a necessary tool for vendors. True / False

True

If an operating system patch is not critical in nature, you might choose to delay installation until a regular patch cycle begins. True / False

True

In memory management, pages are protected using hardware or low-level memory software in each site's ______________.

kernel

In process management, the ______________ actually controls and operates the CPU and manages the queues used for states of execution.

kernel

The ___________ level, in an object-based distributed operating system, provides the basic mechanisms for building parts of the operating system by creating, managing, scheduling, synchronizing, and deleting objects in a dynamic fashion.

kernel

_____ viruses infect data files a. file infector b. boot sector c. macro d.master boot record

macro

If the File Manager is required to provide detailed instructions for each system device (how to start it, get it to move to the correct place where the desired record is located, and when to stop), then the program is considered device dependent. True / False

True

In a distributed system, there is a high level of cooperation and sharing of actions and data maintained by the sites when determining which process should be loaded and where it should be run. True / False

True

In a network, the Processor Manager provides the policies and mechanisms to create, delete, abort, name, rename, find, schedule, block, run, and synchronize processes. True / False

True

In public/private key encryption, the private key is a pair of two prime numbers chosen by the person who wants to receive a private message. True / False

True

Increasing the number of processors necessarily increases overhead required to manage multiple jobs among multiple processors. True / False

True

One popular authentication tool is Kerberos, a network authentication protocol developed as part of the Athena Project at MIT. True / False

True

Rescheduling requests is a technique that can help optimize I/O times. True / False

True

The Network Manager allows a network administrator to monitor the use of individual computers and shared hardware, and ensures compliance with software license agreements. True / False

True

To globally manage the network's entire suite of resources, a DO/S is typically constructed with a replicated kernel operating system. True / False

True

Under a DO/S, resources are allocated based on negotiation and compromise among equally important peer sites in the distributed system. True / False

True

When using a contiguous file storage scheme, the File manager keeps track of empty storage areas by treating them as files. True / False

True

The primary disadvantage of contiguous storage is that _____. a. a file can be spread in small in small pieces throughout the storage area b. the file system is difficult to create, implement, and manage c. the file system cannot support direct access d. a file can't be expanded unless there is empty space available immediately following it

a file can't be expanded unless there is empty space available immediately following it

When discussing networking systems, the _____________ developed first and evolved from the need to give users global access to resources and make the network almost completely transparent for users and local operating systems.

network operating system (NOS)

A(n) ____ server hides important network information from outsiders by making network server invisible.

proxy

On magnetic disks, files can be organized in one of three ways:____ a. sequential, indirect, or direct b. indexed direct, indexed indirect, or random c. sequential, direct, or indexed sequential d. sequential, random, or indirect

sequential, direct, or indexed sequential

A(n) ________________ pack is a term used by some vendors to describe an to customer software to repair existing problems and/or deliver enhancements.

service

The capability of a system to fulfill its mission, in a timely manner, in the presence of attacks, failures, or accidents is known as _____ a. system survivability b. attack resistance c. system recovery d. attack survivability

system survivability

The object used by the Kerberos protocol to provide client verification is known as a ____. a. password b. passphrase c. token d. ticket

ticket

The _________________ time is a measure of a system's efficiency that tracks time required to execute a job and return output to the user.

turnaround

A negative feedback loop mechanism monitors the system and, when it becomes too congested, signals the Job Scheduler to ____. a. send the jobs to another processor b. slow down process arrival rate c. suspend processing d. speed up process arrival rate

b. slow down process arrival rate

As an alternative to passwords, some systems have integrated use of a ____. a. fingerprint scanner b. smart card c. retina scanner d. biometric scanner

b. smart card

In a network operating system (NOS), the network management functions come into play only when the system needs to use the network. At all other times, the operating system operates as if it's a(n) ____. a. process-based DO/S b. stand-alone system c. logically distributed system d. object-based DO/S

b. stand-alone system

The science and technology of identifying authorized users based on their biological characteristics best describes ____________.

biometrics

The formula used to calculate a unit's availability is ____. a. MTBF * (MTBF - MTTR) b. MTBF * (MTBF + MTTR) c. MTBF / (MTBF + MTTR) d. MTBF / (MTBF - MTTR)

c. MTBF / (MTBF + MTTR)

When networked devices, such as printers, plotters, or disk drives are required, the ____ has the responsibility of allocating and deallocating the required resources correctly. a. Network Controller b. Network Device Controller c. Network Manager d. Network Resource Director

c. Network Manager

For each node in a DO/S, the Memory Manager uses a kernel with a ____ algorithm to track the amount of memory that is available. a. turning b. stacking c. paging d. sharing

c. paging

In ____ communication schemes, the sender and receiver are linked and ready to send and receive. a. indirect b. asynchronous c. synchronous d. direct

c. synchronous

____ viruses infect data files. a. Boot sector b. Master boot record c. File infector d. Macro

d. Macro

____ is a form of social engineering whereby an intruder pretends to be a legitimate entity and contacts unwary users asking them to reconfirm their personal and/or financial information. a. Acting b. Impersonating c. Spoofing d. Phishing

d. Phishing

____ is similar to availability but it measures the probability that a unit will not fail during a given time period. a. Response likelihood b. Scalability c. Operability d. Reliability

d. Reliability

A disadvantage of software monitoring tools is that they ____. a. are expensive to install b. are difficult to install c. only monitor CPU speed and ignore the rest of the system d. become part of the system and can distort analysis results

d. become part of the system and can distort analysis results

Memory management is intrinsically linked with ____ management when memory is used to buffer data between a very fast processor and slower secondary storage devices. a. disk b. process c. processor d. device

d. device

The first thing to do upon notification of a new software patch is to____. a. run automatic updating b. test the patch c. deploy the patch d. identify the criticality of the patch

d. identify the criticality of the patch

In a DO/S, the ____ is responsible for process synchronization mechanisms and communication support. a. the responsibility is shared among sites b. central controller c. network manager d. kernel

d. kernel

In a network operating system (NOS), ____. a. local operations at a node are managed by the NOS b. local resources are managed globally c. access control policies are globally managed d. resources are owned by local nodes

d. resources are owned by local nodes

The immediate result of a worm is ____. a. complete data loss with little chance of recovery b. not noticeable until later c. a computer crash with or without a blue screen d. the slower processing time of legitimate work

d. the slower processing time of legitimate work

Bottlenecks tend to develop ____. a. when the system is underutilized b. in a deadlocked system c. when the system is mismanaged d. when resources reach their capacity

d. when resources reach their capacity

Generally, ______ antivirus software compares file sizes (checking for added code when none is expected), looks for replicating instructions, and searches for unusual file activity a. reactive b. firewall c. preventive d. diagnostic

diagnostic

A(n) _____________ operating system accesses resources using global mechanisms rather than local mechanisms.

distributed

Groupware uses technologies such as ______________ processing that allows even greater access to centralized information and to allow users to work together to complete common tasks.

distributed

Total system performance can be defined as the _______________ with which a computer system meets its goals - that is, how well it serves its users.

efficiency

The _______________ loop is a mechanism to monitor the system's resource utilization so adjustments can be made.

feedback

A(n) ___________________ is hardware and/or software designed to protect a system by disguising its IP address from outsiders who don't have authorization to access it or ask for information about it.

firewall

A firewall typically sits between a network and its individual computers. True / False

False

____________ software refers to software that is designed to detect and recover attacks by viruses and worms and is usually part of a system protection software package.

Antivirus

A gap in system security in always indicative of malicious activity. True / False

False

A positive feedback loop mechanism monitors the system and, when it becomes too congested, signals the Job Scheduler to slow down the arrival rate of processes. True / False

False

A relative filename is a name that is selected by the File Manager when the file is created. True / False

False

Benchmark results are valuable because they are not dependent upon system workload, system design and implementation, or the specific requirements of the applications loaded on the system. True / False

False

Blocking I/O requests to optimize access times increases the number of physical I/O requests. True / False

False

If a password consists of ten characters, it would take a human about 4.5 years to guess the password if the human makes one try each second. True / False

False

_____________ refer to the rules or standards of behavior that individuals are expected to follow demonstrating the principles of right and wrong.

Ethics

It will take a computer ____ to crack a password with a length of three characters if the computer tries one million values per second. a. .008788 seconds b. 4.5 seconds c. 2.5 hours d. 58 hours

a. .008788 seconds

____ is/are usually measured under steady-state conditions and will reflect quantities such as "the number of jobs processed per day" or "the number of online transactions handled per hour." a. Throughput b. Bottlenecks c. Turnaround time d. Capacity

a. Throughput

Trash collection, also known as ____, is an evening pastime for those who enjoy perusing anything and everything thrown out by system users. a. dumpster diving b. dumpster surfing c. digital recycling d. trash surfing

a. dumpster diving

The biggest limitation of a network operating system (NOS) is ____ in terms of memory, process, device, and file management. a. lack of global control b. lack of security c. prohibitive cost d. lack of scalability

a. lack of global control

In a typical NOS environment, a user who wants to run a local process at a remote site must first ____. a. log on to the local network b. send a request to the remote site to schedule the process on its system c. instruct the local system to migrate the process or data to the remote site d. log on to the NOS

a. log on to the local network

The immediate result of a worm is ____. a. the slower processing time of legitimate work b. a computer crash with or without a blue screen c. complete data loss with little chance of recovery d. not noticeable until later

a. the slower processing time of legitimate work

The object used by the Kerberos protocol to provide client verification is known as a ____. a. ticket b. passphrase c. password d. token

a. ticket

Errors can occur when data values are incorrectly stored because the field isn't large enough to hold the numeric value stored there. This issue is an example of a(n) ____. a. unintentional attack b. malicious attack c. denial-of-service attack d. trap door attack

a. unintentional attack

The computer system _____ a file by activating the appropriate secondary storage device and loading the file into memory while updating its records of who is using that file. a. configures b. formats c. allocates d. creates

allocates

____ is needed to achieve success in deploying a patch to a large network. a. A synchronized deployment on all computers b. An inventory of all hardware and software on affected computers c. Automated patch installation software d. External patch management hardware

b. An inventory of all hardware and software on affected computers

____ viruses infect data files. a. File infector b. Macro c. Master boot record d. Boot sector

b. Macro

____ peruse data packets as they pass by, examine each one for specific information, and log copies of interesting packets for more detailed examination. a. Spoofers b. Packet sniffers c. Proxy servers d. Packet filters

b. Packet sniffers

Memory management is intrinsically linked with ____ management when memory is used to buffer data between a very fast processor and slower secondary storage devices. a. process b. device c. processor d. disk

b. device

When an application tries to access a page that is not in memory, a ____ occurs and the Memory Manager automatically brings that page into memory. a. page allocation b. page fault c. demand page d. page request

b. page fault


Ensembles d'études connexes

Chapter 8 Operating Systems Study Set

View Set

NBE Practice Exam- Accounting/Computers

View Set

Guaranteed Exam Health WRONG ANSWERS RECIEVED ON PRACTICE EXAM. EXAM FX

View Set

Chapter 2 The Accounting Process

View Set

Chapter 41 PrepU - Management of pt's with musculoskeletal disorders

View Set