INT-1700 Exam 3 True/False Study Guide

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A gap in system security in always indicative of malicious activity

False

A master boot record virus infects both teh boot record and program files, making them especially difficult to repair

False

A path name can be either one name of a list of names separated by dashes

False

A relative filenames is a name that is selected by the File Manager when the file is created

False

An optical disc drive spins at a constant speed- this is called constant linear velocity

False

Device drivers supervise the transmission of data between main memory and the local unit

False

Device management principles are changing rapidly to accommodate cloud computing

False

Filenames are not case sensitive in Linux

False

If a password consists of ten characters, it would take a human about 4.5 years to guess the password if the human makes one try each second.

False

In a file directory true structure, the "leaves" of the tree are subdirectories created by the user

False

In a file management system, information is passed from the Device Manager at the top of the hierarchy to teh File Manager at the bottom

False

Linux was developed by Dennis Ritchie, who wanted to create an operating system to maximize the limited capabilities of the Intel 80386 microprocessor

False

One disadvantage of Windows is that it does not provide much support for users working in non-English languages.

False

Partial network encryption, also called communications encryption, is the most extreme form of encryption

False

Some viruses are considered to be benign

False

Spooling is a security threat that relies on cleartext transmission whereby the assailant falsifies the IP addresses of an Internet server by changing the address recorded in packets it sends over the Internet

False

The File Manager responds to the CREATE command by creating a new fole

False

Windows XP was the last Windows operating system built on the Windows 95 kernel

False

A file extension is usually two to four characters in length and is separated from the relative name by a period

True

A macro virus infects date files, such as word processing documents and spread sheets, though newer versions now infect other program files as well

True

A single computer without access to e-mail or the Internet is easy to protect and has a low risk of attack

True

A subdirectory is created when a user opens an account to access the computer system

True

A virus is defined as a small program written to alter the way a computer operates, without the permission or knowledge of the user

True

A worm is a memory-resident program that copies itself from one system to the next without requiring the aid of an infected program file.

True

All Linux files are organized in directories that are connected to each other in a tree-like structure

True

Any vulnerability at the operating system level opens the entire system to attack

True

At the operating system level, file mapping is typically used for file caching, loading, and running executable programs

True

Before the 1995 release of the Windows 95 operating system, all Windows products were merely graphical user interfaces that required the MS-DOS operating system to perform tasks

True

Blue-ray discs are available in several formats: red-only(BD-ROM), recordable (BD-R), and rewritable(BD-RE)

True

If the File Manager is required to provide detailed instructions for each system device (how to start it, get it to move to the correct place where the desired record is located, and when to stop), then the program is consideref device dependent

True

In public/private key encryption, the private key is a pair of two prime numbers chosen by the person who wants to receive a private message

True

Microsoft has recently introduced an optional file system, called a Resilient File System, for handling files with large data sets.

True

RAID begins with the assumption that a small set of large-capacity disk drives is preferable to a larger set of small-capacity disk drives

True

Recent Windows operating systems provide distrubuted security with Kerberos, which provides authentication, date integrity, and date privacy

True

The name Linux is a contraction of Linus and UNIX

True

The primary file handling concept in recent versions of Windows is the virtual file

True

When using a contiguous file storage scheme, teh File Manager keeps track of empty storage areas by treating them as files

True

the secure log file contains lists of all attempts to log in to the system, including the date, time, and duration of each access attempt

True

the universal serial bus (USB) controller acts as an interface between the operating system, device drivers, applications, and teh devices that are attached via the USB host

True

Anyone is permitted to copy and distribute verbatim copies of the operating system, including those who want to customize it for release to the public

False

Effective distributed security requires an authentification mechanism that allows a server to proves its identity to a client

False

The job of the I/O control unit is to keep up with the I/O request from the CPU and pass them down thje line to the appropriate control unit

False

When a user gives a command to modify the contents of a file, it's actually a command to access folders within the file.

False

Windows is a non-preemptive multitasking, multithreaded operating system

False

Wiretapping involves the capability of authorized users to search through storage, directories, or files for private information

False

Default passwords pose unique vulnerabilities because they are widely known amoung system attackers but are a necessary tool for vendors

True

Direct access storage devices (DASDs) are devices that can directly read or write to an arbitrary place on a disk

True

Directories are special files that contain listings of filenames and their attributes

True

Linux brought much of the speed, efficiency, and flexibility of UNIX to small desktop computers

True

one of the biggest concerns about Windows operating systems is the need for aggressive patch management to combat the many viruses and worms that target these systems

True

Intrusion detection is an example of a strategy for improvising system survivability based on knowledge gained from intrusions

False

Much of Windows is written in assembly language, a programming language that's standardized and readily available

False

Buffers are used to synchromize the movement of data between the relatively slow I/O devices and the very fast CPU

True

Linux is an open source program

True

A firewall typically sits between a network and its individual computers

False

A volume must contain a single file

False

A driver object can only have one device connected to it

False

A field is a group of related records that can be identified by the user with a name, type, and a size

False


संबंधित स्टडी सेट्स

NU472 HESI Obstetrics/Maternity Practice Quiz - 43 Questions

View Set

MED SURG SUCCESS/ Genitourinary Disorders

View Set