INT-1700 Exam 3 True/False Study Guide
A gap in system security in always indicative of malicious activity
False
A master boot record virus infects both teh boot record and program files, making them especially difficult to repair
False
A path name can be either one name of a list of names separated by dashes
False
A relative filenames is a name that is selected by the File Manager when the file is created
False
An optical disc drive spins at a constant speed- this is called constant linear velocity
False
Device drivers supervise the transmission of data between main memory and the local unit
False
Device management principles are changing rapidly to accommodate cloud computing
False
Filenames are not case sensitive in Linux
False
If a password consists of ten characters, it would take a human about 4.5 years to guess the password if the human makes one try each second.
False
In a file directory true structure, the "leaves" of the tree are subdirectories created by the user
False
In a file management system, information is passed from the Device Manager at the top of the hierarchy to teh File Manager at the bottom
False
Linux was developed by Dennis Ritchie, who wanted to create an operating system to maximize the limited capabilities of the Intel 80386 microprocessor
False
One disadvantage of Windows is that it does not provide much support for users working in non-English languages.
False
Partial network encryption, also called communications encryption, is the most extreme form of encryption
False
Some viruses are considered to be benign
False
Spooling is a security threat that relies on cleartext transmission whereby the assailant falsifies the IP addresses of an Internet server by changing the address recorded in packets it sends over the Internet
False
The File Manager responds to the CREATE command by creating a new fole
False
Windows XP was the last Windows operating system built on the Windows 95 kernel
False
A file extension is usually two to four characters in length and is separated from the relative name by a period
True
A macro virus infects date files, such as word processing documents and spread sheets, though newer versions now infect other program files as well
True
A single computer without access to e-mail or the Internet is easy to protect and has a low risk of attack
True
A subdirectory is created when a user opens an account to access the computer system
True
A virus is defined as a small program written to alter the way a computer operates, without the permission or knowledge of the user
True
A worm is a memory-resident program that copies itself from one system to the next without requiring the aid of an infected program file.
True
All Linux files are organized in directories that are connected to each other in a tree-like structure
True
Any vulnerability at the operating system level opens the entire system to attack
True
At the operating system level, file mapping is typically used for file caching, loading, and running executable programs
True
Before the 1995 release of the Windows 95 operating system, all Windows products were merely graphical user interfaces that required the MS-DOS operating system to perform tasks
True
Blue-ray discs are available in several formats: red-only(BD-ROM), recordable (BD-R), and rewritable(BD-RE)
True
If the File Manager is required to provide detailed instructions for each system device (how to start it, get it to move to the correct place where the desired record is located, and when to stop), then the program is consideref device dependent
True
In public/private key encryption, the private key is a pair of two prime numbers chosen by the person who wants to receive a private message
True
Microsoft has recently introduced an optional file system, called a Resilient File System, for handling files with large data sets.
True
RAID begins with the assumption that a small set of large-capacity disk drives is preferable to a larger set of small-capacity disk drives
True
Recent Windows operating systems provide distrubuted security with Kerberos, which provides authentication, date integrity, and date privacy
True
The name Linux is a contraction of Linus and UNIX
True
The primary file handling concept in recent versions of Windows is the virtual file
True
When using a contiguous file storage scheme, teh File Manager keeps track of empty storage areas by treating them as files
True
the secure log file contains lists of all attempts to log in to the system, including the date, time, and duration of each access attempt
True
the universal serial bus (USB) controller acts as an interface between the operating system, device drivers, applications, and teh devices that are attached via the USB host
True
Anyone is permitted to copy and distribute verbatim copies of the operating system, including those who want to customize it for release to the public
False
Effective distributed security requires an authentification mechanism that allows a server to proves its identity to a client
False
The job of the I/O control unit is to keep up with the I/O request from the CPU and pass them down thje line to the appropriate control unit
False
When a user gives a command to modify the contents of a file, it's actually a command to access folders within the file.
False
Windows is a non-preemptive multitasking, multithreaded operating system
False
Wiretapping involves the capability of authorized users to search through storage, directories, or files for private information
False
Default passwords pose unique vulnerabilities because they are widely known amoung system attackers but are a necessary tool for vendors
True
Direct access storage devices (DASDs) are devices that can directly read or write to an arbitrary place on a disk
True
Directories are special files that contain listings of filenames and their attributes
True
Linux brought much of the speed, efficiency, and flexibility of UNIX to small desktop computers
True
one of the biggest concerns about Windows operating systems is the need for aggressive patch management to combat the many viruses and worms that target these systems
True
Intrusion detection is an example of a strategy for improvising system survivability based on knowledge gained from intrusions
False
Much of Windows is written in assembly language, a programming language that's standardized and readily available
False
Buffers are used to synchromize the movement of data between the relatively slow I/O devices and the very fast CPU
True
Linux is an open source program
True
A firewall typically sits between a network and its individual computers
False
A volume must contain a single file
False
A driver object can only have one device connected to it
False
A field is a group of related records that can be identified by the user with a name, type, and a size
False
