CS201 Week 4
Intrusion detection is an example of a strategy for improving system survivability based on knowledge gained from intrusions.
False
Partial network encryption, also called communications encryption, is the most extreme form of encryption.
False
Some viruses are considered to be benign.
False
The File Manager responds to the CREATE command by creating a new file.
False
Although noncontiguous allocation schemes eliminate external storage fragmentation and the need for compaction, they don't support direct access because there's no easy way to determine the exact location of a specific record.
True
In public/private key encryption, the private key is a pair of two prime numbers chosen by the person who wants to receive a private message.
True
When nonsynchronized processes access data records and modify some but not all of a record's fields, it is called "accidental incomplete modification of data."
True
The computer system ____ a file by activating the appropriate secondary storage device and loading the file into memory while updating its records of who is using that file.
allocates
When using indexed sequential record organization, each entry in the index file contains the ____ and the physical location of the data block where this record, and the records with smaller keys, are stored.
highest record key
When data is stored in fixed length fields, data that extends beyond the fixed size ____.
is truncated
One major disadvantage of encryption is that ____.
it increases the system's overhead
Two methods of active wiretapping are "between lines transmission" and "____."
piggyback entry
On magnetic disks, files can be organized in one of three ways: ____.
sequential, direct, or indexed sequential
Although a user directory is treated as a file, it is flagged to indicate to the File Manager that this file is really a ____ whose records are filenames that point to files.
subdirectory
Errors can occur when data values are incorrectly stored because the field isn't large enough to hold the numeric value stored there. This issue is an example of a(n) ____.
unintentional attack
A relative filename is a name that is selected by the File Manager when the file is created.
False
The formula for computing the current byte address (CBA) for a direct access file with fixed record length is ____.
CBA = (RN - 1) * RL
____ is a form of social engineering whereby an intruder pretends to be a legitimate entity and contacts unwary users asking them to reconfirm their personal and/or financial information.
Phishing
A subdirectory is created when a user opens an account to access the computer system.
True
The primary disadvantage of contiguous storage is that ____.
a file can't be expanded unless there is empty space available immediately following it
