INT- 1700 Exam #3

Ace your homework & exams now with Quizwiz!

In Linux, each process is referenced by a descriptor, which contains approximately fifteen fields describing the process attributes together with the information needed to manage the process a. True b. False

False

it will take a computer _______ to crack a password with a length of three characters if the computer tries one million values per secend a. .008788 seconds b. 4.5 secends c. 2.5 hours d. 58 hours

a. .008788 seconds

Linux terminal management conforms to ___________ standards, it also supports pseudo-terminals a. POSIX b. SCSI c. USB d. DLL

a. POSIX

the primary programming interface for windows is _______ a. Win32 API b. MS-DOS c. POSIX d. CDFS

a. Win32 API

In Linux, the _______ log file stores messages of which systems have successfully started up and shut down, as well as any that have failed to do so a. boot.log b. dmesg c. auth.log d. secure

a. boot.log

the Linux page replacement algorithm is an expanded version of the __________ replacement policy a. clock page b. clock c. page clock d. page

a. clock page

Generally, ____ antivirus software compares file sizes (checking for added code when none is expected), looks for replicating instructions, and searches for unusual file activity a. diagnostic b. preventive c. reactive d. firewall

a. diagnostic

Trash collection, also known as __________, is an evening pastime for those who enjoy perusing anything and everything thrown out by system users a. dumpster diving b. digital recycling c. dumpster surfing d. trash surfing

a. dumpster diving

In Linux device management, the _________ device number is used as an index to the array to access the appropriate code for a specific device driver a. major b. minor c. unique d. support

a. major

________ files exploit virtual memory capabilities by allowing an application to open a file of arbitrary size and treat it as a single contiguous array of memory locations without buffering data or performing disk I/O a. memory-mapped b. virtual memory c. virtual system d. cached

a. memory-mapped

_______ involves the use of graphics and a pattern of clicks using a touch screen, mouse, or other pointing device a. picture passwords b. fingerprint scanner c. biometric scanner d. retina scanner

a. picture passwords

the portion of memory that is used for sections of the kernel that require maximum performance is the ____________ a. resident operating system code b. system non-paged pool c. system paged pool d. paged user code and data pool

a. resident operating system code

errors can accur when data values are incorrectly stored because the field isn't large enough to hold the numeric value stored there. This issue is an example of a(n)____________ a. unintentinal attack b. malicious attack c. denial-of-service attack d. trap door attack

a. unintentional attack

__________ provide a high-level interface for passing data between two processes regardless of their locations a. Sink caches b. Named Pipes c. Memory-mapped I/O d. Mailslots

b. Named Pipes

when opening a file in windows, the creation of _____ helps bridge the gap between the characteristics of physical devices and directory and file system structures by providing a memory-based representation of shareable physical resources a. resource objects b. file objects c. file pointers d. reference pointers

b. file objects

in windows terminology, the privileged processor mode is called______________ mode and the non-privileged processor mode is called user mode a. server b. Kernel c. internal d. computer

b. kernel

an entire system that is back up once a week and only backs up files daily that are changed on that day is known as a(n)_______backup a. incremental b. layered c. phased d. recovery-based

b. layered

two methods of active wiretapping are "between lines transmission" and "____" a. trojan horse b. piggyback entry c. browsing d. trap doors

b. piggyback entry

Linux provides semaphores to help solve the problems of mutual exclusion and of producers and consumers. The Linux Semaphore structure contains________ fields a. two b. three c. four d. five

b. three

The windows task manager can be opened by pressing and holding the ___________ keys togeather a. Ctrl, W, T b. Ctrl, Alt, and Esc c. Ctrl, Alt, and Delete d. Alt and Tab

c. Ctrl, Alt, and Delete

intruders have been known to capture user passwords by using a _____ to replace the standard login promgram on the computer with an identical fake login the capture keystrokes a. work b. masquarade program c. Trojan horse d. virtual login consol

c. Trojan horse

typing MD from the command prompt screen will____________ a. rename the listed files b. check the disk/file/directory status c. create a new directory or subdirectory d. display relashonsips of files stored on the current directory

c. create a new directory or subdirectory

what strategy contributes most to system recovery? a. authentication b. integrity checking c. data replication d. encryption

c. data replication

______ pursue data packets as they pass by, examine each one for specific information, and log copies of interesting packets for more detailed examination a. spoofers b. proxy servers c. packet sniffers d. packet filters

c. packet sniffers

a __________ server hides important netwowrk infomation from outsideres by making the network server invisible a. redirection b. blocking c. proxy d. fire

c. proxy

Linux updates are issued free to the public about every ________ months a. two b. four c. six d. eight

c. six

under Linux filename conventions, the _____ represents the root directory a. \ b. .. c.^ d. /

d. /

______ viruses infect data files a. file infector b. boot sector c. master boot record d. Macro

d. Macro

a ________ combines into one program the characteristics of other attacks a. Trojan horse b. worm c. multi-thread virus d. blended threat

d. blended threat

In Linux, ________ devices cannot host a file system a. write b. read c. block d. char

d. char

the three standard classes of devices supported by Linux are______________ a. character devices, system devices, and network interfaces b. system devices, block devices, and network interfaces c. character devices, block devices, and network interfaces d. character devices, block devices, and network devices

d. character devices, block devices, and network devices

the ________ attribute indicates whether to delete a file after closing it a. delete b. file close c. disposal mode d. file deposition

d. file desposition

when a process begins execution, it's segments have a _____ size a. large b. variable c. small d. fixed

d. fixed

the file disposition attribute________. a. indicates the type of device on which the file resides b. indicates whether I/O is synchronous or asynchronous c. identifies the current location of the file d. indicates whether the delete the file after closing it

d. indicates whether to delete the file after closing it

administrators use __________logs that provide detailed description of activity on the system a. file b. directory c. detailed d. system

d. system

the object used by the Kerberos protocol to provide client verification is known as a ___________ a. password b. passphrase c. token d. ticket

d. ticket

Linux was developed by Dennis Richie, who wanted to create an operating system to maximize the limited capabilities of the Intel 80386 microprocessor a. true b. false

false

a master book record virus infects both the book record and program files, making them especially difficult to repair. a. true b. false

false

a pages middle directory contains a pointer to the actual page frame a. true b. false

false

a path name can be either one name or a list of names separated by dashes a. true b. false

false

anyone is permitted to copy and distribute verbatim copies of the operating system, including those who want to customize it for release tot he public a. true b. false

false

device drivers supervise the transmition of data between main memory and the local unit a. true b. false

false

effective distributed security requires an authentication mechanism that allows the server to prove it's identity to a client a. true b. false

false

filenames are not case sensitive in Linux a. true b. false

false

if a password consists of ten characters, it would take a human about 4.5 years to guess the password if the human makes one try each secend a. true b. false

false

intrusion detection is an example of a stratagey for improving system suvivability based on knowledge gained from intrusions a. true b. false

false

partial network encryption, also called communications encryption, is the most extreme form of encryption. a. true b. false

false

some viruses are considered to be benign a. true b. false

false

spooling is a security threat that relies on cleartext transmission whereby the assailant falsifies the IP addresses of an internet server by changing the address recorded in packets it sends over the internet a. true b. false

false

the lower half of the virtual address space is accessible only to kernel-mode processes a. true b. false

false

the open mode attribute for a file indicates whether other callers can open the file for read,write, or delete operations while this caller is using it a. true b. false

false

when a process requests pages, Linux loads them into memory. When the Kernel needs the memory space, the pages are released using a most recently used (MRU) algorithm a. true b. false

false

windows XP was the last windows operating system build o the windows 95 kernel a. true b. false

false

windows is a non-preemptive multitasking, multithreaded operating system a. true b. false

false

wiretapping involves the capability of authorized users to search through storage, directories, or files for private information a. true b. false

false

Before the 1995 release of the windows 95 operating system, all windows products were merely graphical user interfaces that required the MS-DOS operating system to perform tasks a. true b. false

true

Linux has system calls that change the size of the process data segment, either by expanding it to accommodate extra data values or reducing it when certain values positioned at the end of the data segment are no longer needed. a. true b. false

true

a continuing series of security awareness and ethics communications to computer users is more effective than a single announcement a. true b. false

true

a replacement paging policy determines which virtual page must be removed from memory to make room for a new page a. true b. false

true

a virus is defined as a small program written to alter the way a computer operates, without the permission or knowledge of the user a. true b. false

true

any vulnerability at the operating system level opens the entire system to attack a. true b. false

true

at the operating system level, file mapping is typically used for file catching, loading, and running executable programs a. true b. false

true

default passwords pose unique vulnerabilities because they are widely known among system attackers but are a necessary took for vendors a. true b. false

true

in recent windows operating systems, almost all low-level I/O operations are asynchronous a. true b. false

true

one of the biggest concerns about windows operating systems is the need for aggressive patch management to combat the many viruses and worms that target these systems a. true b. false

true

one popular authentication took is Kerberos, a network authentication protocol developed as part of the Athena Project at MIT a. true b. false

true

the secure log file contains lists of all attempts to log in to the system, including the date, time, and duration of each access atempt a. true b. false

true

when Linux allocates memory space, by default it allocates one GB of high-order memory to the kernel and three GB of memory to executing porccesses a. true b. false

true

when non-synchronized processes access data records and modify some but not all of a record's fields, it is called "accidental incomplete modification of data" a. true b. false

true


Related study sets

Anatomy Quiz 2 - Muscles and Bones of the Axial Skeleton

View Set

MIS 111 LAB Problem Sets 1-13 Q&A's

View Set

Gestational Diabetes Hesi Case Study - 2019

View Set

Chapter 19 patterns of chromosomal Inheritance

View Set

Chapter 3 Protein Structure and Function

View Set