CISS: Operating Systems 301 Final Study Guide
______________ refers to a resource measurement tool that indicates the likelihood that the resource will be ready when a user needs it and is influenced by mean between failures and mean time to repair.
Availability
In a file management system, information is passed from the Device Manager at the top of the hierarchy to the File Manager at the bottom. True / False
False
Some viruses are considered to be benign True / False
False
System efficiency is affected primarily by two major components: user programs and operating system programs. True / False
False
The location of a volume's directory on the disk does not make a difference in the time it takes to access it. True / False
False
Wiretapping involves the capability of authorized users to search through storage, directories, or files for private information. True / False
False
The IEEE and the Association for Computing Machinery (ACM) issued a standard of ethics for the global computing community in 1977. True / False
False (1992)
Each kernel is operated by the application software which, in turn, is directed by the kernel running on the host computer. True / False
False (Each kernel is operated by the DO/S, which, in turn, is directed by the application software running on the host computer.)
If a process requests access to a region in memory, the process manager determines whether the requesting process has been previously granted rights. True / False
False (If a process requests access to a region in memory, the capability manager first determines whether the requesting process has been previously granted rights.)
Intrusion detection is an example of a strategy for improving system survivability based on knowledge gained from intrusions. True / False
False (Intrusion recognition patterns)
The distributed operating system (DO/S) was developed before the network operating system (NOS). True / False
False (NOS was developed first.)
Networks were created initially to share data. True / False
False (Networks were created initially to share expensive hardware resources such as large mainframes, centralized high-speed printers, and sizable hard disks.)
Execute-only access allows users to read the page; however, they are not allowed to modify it. True / False
False (Read-only)
Partial network encryption, also called communications encryption, is the most extreme form of encryption. True / False
False (Total network encryption)
_________________ is a resource measurement tool defined as the average time needed to fix a failed unit and put it back in service.
Mean time to repair (MTTR)
_____________ engineering is a technique whereby system intruders gain access to information about a legitimate user to learn active passwords, sometimes by calling the user and posing as a system technician.
Social
______________ is a security threat that relies on clear text transmission, whereby assailant falsifies the IP addresses of an Internet server by changing the address recorded in packets it sends over the Internet.
Spoofing
A DO/S must keep a global accounting of each network device and its availability, maintain each device's status record and control block, and distribute this information to all sites. True / False
True
A continuing series of security awareness and ethics communications to computer users is more effective than a single announcement. True / False
True
A field is a group of related records that can be identified by the user with a name, type, and size. True / False
True
A logic bomb often spreads unnoticed throughout a network until a predetermined event, when it goes off and does its damage. True / False
True
A single computer without access to e-mail or the Internet is easy to protect and has a low risk of attack. True / False
True
Any system improvement can be made only after extensive analysis of the needs of the system's resources, requirements, managers, and users. True / False
True
Benchmarks are often used by vendors to demonstrate to prospective clients the specific advantages of a new CPU, operating system, compiler, or piece of hardware. True / False
True
Data redundancy can make files much faster and easier to read. True / False
True
Default passwords pose unique vulnerabilities because they are widely known among system attackers but are a necessary tool for vendors. True / False
True
If an operating system patch is not critical in nature, you might choose to delay installation until a regular patch cycle begins. True / False
True
In memory management, pages are protected using hardware or low-level memory software in each site's ______________.
kernel
In process management, the ______________ actually controls and operates the CPU and manages the queues used for states of execution.
kernel
The ___________ level, in an object-based distributed operating system, provides the basic mechanisms for building parts of the operating system by creating, managing, scheduling, synchronizing, and deleting objects in a dynamic fashion.
kernel
_____ viruses infect data files a. file infector b. boot sector c. macro d.master boot record
macro
If the File Manager is required to provide detailed instructions for each system device (how to start it, get it to move to the correct place where the desired record is located, and when to stop), then the program is considered device dependent. True / False
True
In a distributed system, there is a high level of cooperation and sharing of actions and data maintained by the sites when determining which process should be loaded and where it should be run. True / False
True
In a network, the Processor Manager provides the policies and mechanisms to create, delete, abort, name, rename, find, schedule, block, run, and synchronize processes. True / False
True
In public/private key encryption, the private key is a pair of two prime numbers chosen by the person who wants to receive a private message. True / False
True
Increasing the number of processors necessarily increases overhead required to manage multiple jobs among multiple processors. True / False
True
One popular authentication tool is Kerberos, a network authentication protocol developed as part of the Athena Project at MIT. True / False
True
Rescheduling requests is a technique that can help optimize I/O times. True / False
True
The Network Manager allows a network administrator to monitor the use of individual computers and shared hardware, and ensures compliance with software license agreements. True / False
True
To globally manage the network's entire suite of resources, a DO/S is typically constructed with a replicated kernel operating system. True / False
True
Under a DO/S, resources are allocated based on negotiation and compromise among equally important peer sites in the distributed system. True / False
True
When using a contiguous file storage scheme, the File manager keeps track of empty storage areas by treating them as files. True / False
True
The primary disadvantage of contiguous storage is that _____. a. a file can be spread in small in small pieces throughout the storage area b. the file system is difficult to create, implement, and manage c. the file system cannot support direct access d. a file can't be expanded unless there is empty space available immediately following it
a file can't be expanded unless there is empty space available immediately following it
When discussing networking systems, the _____________ developed first and evolved from the need to give users global access to resources and make the network almost completely transparent for users and local operating systems.
network operating system (NOS)
A(n) ____ server hides important network information from outsiders by making network server invisible.
proxy
On magnetic disks, files can be organized in one of three ways:____ a. sequential, indirect, or direct b. indexed direct, indexed indirect, or random c. sequential, direct, or indexed sequential d. sequential, random, or indirect
sequential, direct, or indexed sequential
A(n) ________________ pack is a term used by some vendors to describe an to customer software to repair existing problems and/or deliver enhancements.
service
The capability of a system to fulfill its mission, in a timely manner, in the presence of attacks, failures, or accidents is known as _____ a. system survivability b. attack resistance c. system recovery d. attack survivability
system survivability
The object used by the Kerberos protocol to provide client verification is known as a ____. a. password b. passphrase c. token d. ticket
ticket
The _________________ time is a measure of a system's efficiency that tracks time required to execute a job and return output to the user.
turnaround
A negative feedback loop mechanism monitors the system and, when it becomes too congested, signals the Job Scheduler to ____. a. send the jobs to another processor b. slow down process arrival rate c. suspend processing d. speed up process arrival rate
b. slow down process arrival rate
As an alternative to passwords, some systems have integrated use of a ____. a. fingerprint scanner b. smart card c. retina scanner d. biometric scanner
b. smart card
In a network operating system (NOS), the network management functions come into play only when the system needs to use the network. At all other times, the operating system operates as if it's a(n) ____. a. process-based DO/S b. stand-alone system c. logically distributed system d. object-based DO/S
b. stand-alone system
The science and technology of identifying authorized users based on their biological characteristics best describes ____________.
biometrics
The formula used to calculate a unit's availability is ____. a. MTBF * (MTBF - MTTR) b. MTBF * (MTBF + MTTR) c. MTBF / (MTBF + MTTR) d. MTBF / (MTBF - MTTR)
c. MTBF / (MTBF + MTTR)
When networked devices, such as printers, plotters, or disk drives are required, the ____ has the responsibility of allocating and deallocating the required resources correctly. a. Network Controller b. Network Device Controller c. Network Manager d. Network Resource Director
c. Network Manager
For each node in a DO/S, the Memory Manager uses a kernel with a ____ algorithm to track the amount of memory that is available. a. turning b. stacking c. paging d. sharing
c. paging
In ____ communication schemes, the sender and receiver are linked and ready to send and receive. a. indirect b. asynchronous c. synchronous d. direct
c. synchronous
____ viruses infect data files. a. Boot sector b. Master boot record c. File infector d. Macro
d. Macro
____ is a form of social engineering whereby an intruder pretends to be a legitimate entity and contacts unwary users asking them to reconfirm their personal and/or financial information. a. Acting b. Impersonating c. Spoofing d. Phishing
d. Phishing
____ is similar to availability but it measures the probability that a unit will not fail during a given time period. a. Response likelihood b. Scalability c. Operability d. Reliability
d. Reliability
A disadvantage of software monitoring tools is that they ____. a. are expensive to install b. are difficult to install c. only monitor CPU speed and ignore the rest of the system d. become part of the system and can distort analysis results
d. become part of the system and can distort analysis results
Memory management is intrinsically linked with ____ management when memory is used to buffer data between a very fast processor and slower secondary storage devices. a. disk b. process c. processor d. device
d. device
The first thing to do upon notification of a new software patch is to____. a. run automatic updating b. test the patch c. deploy the patch d. identify the criticality of the patch
d. identify the criticality of the patch
In a DO/S, the ____ is responsible for process synchronization mechanisms and communication support. a. the responsibility is shared among sites b. central controller c. network manager d. kernel
d. kernel
In a network operating system (NOS), ____. a. local operations at a node are managed by the NOS b. local resources are managed globally c. access control policies are globally managed d. resources are owned by local nodes
d. resources are owned by local nodes
The immediate result of a worm is ____. a. complete data loss with little chance of recovery b. not noticeable until later c. a computer crash with or without a blue screen d. the slower processing time of legitimate work
d. the slower processing time of legitimate work
Bottlenecks tend to develop ____. a. when the system is underutilized b. in a deadlocked system c. when the system is mismanaged d. when resources reach their capacity
d. when resources reach their capacity
Generally, ______ antivirus software compares file sizes (checking for added code when none is expected), looks for replicating instructions, and searches for unusual file activity a. reactive b. firewall c. preventive d. diagnostic
diagnostic
A(n) _____________ operating system accesses resources using global mechanisms rather than local mechanisms.
distributed
Groupware uses technologies such as ______________ processing that allows even greater access to centralized information and to allow users to work together to complete common tasks.
distributed
Total system performance can be defined as the _______________ with which a computer system meets its goals - that is, how well it serves its users.
efficiency
The _______________ loop is a mechanism to monitor the system's resource utilization so adjustments can be made.
feedback
A(n) ___________________ is hardware and/or software designed to protect a system by disguising its IP address from outsiders who don't have authorization to access it or ask for information about it.
firewall
A firewall typically sits between a network and its individual computers. True / False
False
____________ software refers to software that is designed to detect and recover attacks by viruses and worms and is usually part of a system protection software package.
Antivirus
A gap in system security in always indicative of malicious activity. True / False
False
A positive feedback loop mechanism monitors the system and, when it becomes too congested, signals the Job Scheduler to slow down the arrival rate of processes. True / False
False
A relative filename is a name that is selected by the File Manager when the file is created. True / False
False
Benchmark results are valuable because they are not dependent upon system workload, system design and implementation, or the specific requirements of the applications loaded on the system. True / False
False
Blocking I/O requests to optimize access times increases the number of physical I/O requests. True / False
False
If a password consists of ten characters, it would take a human about 4.5 years to guess the password if the human makes one try each second. True / False
False
_____________ refer to the rules or standards of behavior that individuals are expected to follow demonstrating the principles of right and wrong.
Ethics
It will take a computer ____ to crack a password with a length of three characters if the computer tries one million values per second. a. .008788 seconds b. 4.5 seconds c. 2.5 hours d. 58 hours
a. .008788 seconds
____ is/are usually measured under steady-state conditions and will reflect quantities such as "the number of jobs processed per day" or "the number of online transactions handled per hour." a. Throughput b. Bottlenecks c. Turnaround time d. Capacity
a. Throughput
Trash collection, also known as ____, is an evening pastime for those who enjoy perusing anything and everything thrown out by system users. a. dumpster diving b. dumpster surfing c. digital recycling d. trash surfing
a. dumpster diving
The biggest limitation of a network operating system (NOS) is ____ in terms of memory, process, device, and file management. a. lack of global control b. lack of security c. prohibitive cost d. lack of scalability
a. lack of global control
In a typical NOS environment, a user who wants to run a local process at a remote site must first ____. a. log on to the local network b. send a request to the remote site to schedule the process on its system c. instruct the local system to migrate the process or data to the remote site d. log on to the NOS
a. log on to the local network
The immediate result of a worm is ____. a. the slower processing time of legitimate work b. a computer crash with or without a blue screen c. complete data loss with little chance of recovery d. not noticeable until later
a. the slower processing time of legitimate work
The object used by the Kerberos protocol to provide client verification is known as a ____. a. ticket b. passphrase c. password d. token
a. ticket
Errors can occur when data values are incorrectly stored because the field isn't large enough to hold the numeric value stored there. This issue is an example of a(n) ____. a. unintentional attack b. malicious attack c. denial-of-service attack d. trap door attack
a. unintentional attack
The computer system _____ a file by activating the appropriate secondary storage device and loading the file into memory while updating its records of who is using that file. a. configures b. formats c. allocates d. creates
allocates
____ is needed to achieve success in deploying a patch to a large network. a. A synchronized deployment on all computers b. An inventory of all hardware and software on affected computers c. Automated patch installation software d. External patch management hardware
b. An inventory of all hardware and software on affected computers
____ viruses infect data files. a. File infector b. Macro c. Master boot record d. Boot sector
b. Macro
____ peruse data packets as they pass by, examine each one for specific information, and log copies of interesting packets for more detailed examination. a. Spoofers b. Packet sniffers c. Proxy servers d. Packet filters
b. Packet sniffers
Memory management is intrinsically linked with ____ management when memory is used to buffer data between a very fast processor and slower secondary storage devices. a. process b. device c. processor d. disk
b. device
When an application tries to access a page that is not in memory, a ____ occurs and the Memory Manager automatically brings that page into memory. a. page allocation b. page fault c. demand page d. page request
b. page fault