INT- 1700 Exam #3
In Linux, each process is referenced by a descriptor, which contains approximately fifteen fields describing the process attributes together with the information needed to manage the process a. True b. False
False
it will take a computer _______ to crack a password with a length of three characters if the computer tries one million values per secend a. .008788 seconds b. 4.5 secends c. 2.5 hours d. 58 hours
a. .008788 seconds
Linux terminal management conforms to ___________ standards, it also supports pseudo-terminals a. POSIX b. SCSI c. USB d. DLL
a. POSIX
the primary programming interface for windows is _______ a. Win32 API b. MS-DOS c. POSIX d. CDFS
a. Win32 API
In Linux, the _______ log file stores messages of which systems have successfully started up and shut down, as well as any that have failed to do so a. boot.log b. dmesg c. auth.log d. secure
a. boot.log
the Linux page replacement algorithm is an expanded version of the __________ replacement policy a. clock page b. clock c. page clock d. page
a. clock page
Generally, ____ antivirus software compares file sizes (checking for added code when none is expected), looks for replicating instructions, and searches for unusual file activity a. diagnostic b. preventive c. reactive d. firewall
a. diagnostic
Trash collection, also known as __________, is an evening pastime for those who enjoy perusing anything and everything thrown out by system users a. dumpster diving b. digital recycling c. dumpster surfing d. trash surfing
a. dumpster diving
In Linux device management, the _________ device number is used as an index to the array to access the appropriate code for a specific device driver a. major b. minor c. unique d. support
a. major
________ files exploit virtual memory capabilities by allowing an application to open a file of arbitrary size and treat it as a single contiguous array of memory locations without buffering data or performing disk I/O a. memory-mapped b. virtual memory c. virtual system d. cached
a. memory-mapped
_______ involves the use of graphics and a pattern of clicks using a touch screen, mouse, or other pointing device a. picture passwords b. fingerprint scanner c. biometric scanner d. retina scanner
a. picture passwords
the portion of memory that is used for sections of the kernel that require maximum performance is the ____________ a. resident operating system code b. system non-paged pool c. system paged pool d. paged user code and data pool
a. resident operating system code
errors can accur when data values are incorrectly stored because the field isn't large enough to hold the numeric value stored there. This issue is an example of a(n)____________ a. unintentinal attack b. malicious attack c. denial-of-service attack d. trap door attack
a. unintentional attack
__________ provide a high-level interface for passing data between two processes regardless of their locations a. Sink caches b. Named Pipes c. Memory-mapped I/O d. Mailslots
b. Named Pipes
when opening a file in windows, the creation of _____ helps bridge the gap between the characteristics of physical devices and directory and file system structures by providing a memory-based representation of shareable physical resources a. resource objects b. file objects c. file pointers d. reference pointers
b. file objects
in windows terminology, the privileged processor mode is called______________ mode and the non-privileged processor mode is called user mode a. server b. Kernel c. internal d. computer
b. kernel
an entire system that is back up once a week and only backs up files daily that are changed on that day is known as a(n)_______backup a. incremental b. layered c. phased d. recovery-based
b. layered
two methods of active wiretapping are "between lines transmission" and "____" a. trojan horse b. piggyback entry c. browsing d. trap doors
b. piggyback entry
Linux provides semaphores to help solve the problems of mutual exclusion and of producers and consumers. The Linux Semaphore structure contains________ fields a. two b. three c. four d. five
b. three
The windows task manager can be opened by pressing and holding the ___________ keys togeather a. Ctrl, W, T b. Ctrl, Alt, and Esc c. Ctrl, Alt, and Delete d. Alt and Tab
c. Ctrl, Alt, and Delete
intruders have been known to capture user passwords by using a _____ to replace the standard login promgram on the computer with an identical fake login the capture keystrokes a. work b. masquarade program c. Trojan horse d. virtual login consol
c. Trojan horse
typing MD from the command prompt screen will____________ a. rename the listed files b. check the disk/file/directory status c. create a new directory or subdirectory d. display relashonsips of files stored on the current directory
c. create a new directory or subdirectory
what strategy contributes most to system recovery? a. authentication b. integrity checking c. data replication d. encryption
c. data replication
______ pursue data packets as they pass by, examine each one for specific information, and log copies of interesting packets for more detailed examination a. spoofers b. proxy servers c. packet sniffers d. packet filters
c. packet sniffers
a __________ server hides important netwowrk infomation from outsideres by making the network server invisible a. redirection b. blocking c. proxy d. fire
c. proxy
Linux updates are issued free to the public about every ________ months a. two b. four c. six d. eight
c. six
under Linux filename conventions, the _____ represents the root directory a. \ b. .. c.^ d. /
d. /
______ viruses infect data files a. file infector b. boot sector c. master boot record d. Macro
d. Macro
a ________ combines into one program the characteristics of other attacks a. Trojan horse b. worm c. multi-thread virus d. blended threat
d. blended threat
In Linux, ________ devices cannot host a file system a. write b. read c. block d. char
d. char
the three standard classes of devices supported by Linux are______________ a. character devices, system devices, and network interfaces b. system devices, block devices, and network interfaces c. character devices, block devices, and network interfaces d. character devices, block devices, and network devices
d. character devices, block devices, and network devices
the ________ attribute indicates whether to delete a file after closing it a. delete b. file close c. disposal mode d. file deposition
d. file desposition
when a process begins execution, it's segments have a _____ size a. large b. variable c. small d. fixed
d. fixed
the file disposition attribute________. a. indicates the type of device on which the file resides b. indicates whether I/O is synchronous or asynchronous c. identifies the current location of the file d. indicates whether the delete the file after closing it
d. indicates whether to delete the file after closing it
administrators use __________logs that provide detailed description of activity on the system a. file b. directory c. detailed d. system
d. system
the object used by the Kerberos protocol to provide client verification is known as a ___________ a. password b. passphrase c. token d. ticket
d. ticket
Linux was developed by Dennis Richie, who wanted to create an operating system to maximize the limited capabilities of the Intel 80386 microprocessor a. true b. false
false
a master book record virus infects both the book record and program files, making them especially difficult to repair. a. true b. false
false
a pages middle directory contains a pointer to the actual page frame a. true b. false
false
a path name can be either one name or a list of names separated by dashes a. true b. false
false
anyone is permitted to copy and distribute verbatim copies of the operating system, including those who want to customize it for release tot he public a. true b. false
false
device drivers supervise the transmition of data between main memory and the local unit a. true b. false
false
effective distributed security requires an authentication mechanism that allows the server to prove it's identity to a client a. true b. false
false
filenames are not case sensitive in Linux a. true b. false
false
if a password consists of ten characters, it would take a human about 4.5 years to guess the password if the human makes one try each secend a. true b. false
false
intrusion detection is an example of a stratagey for improving system suvivability based on knowledge gained from intrusions a. true b. false
false
partial network encryption, also called communications encryption, is the most extreme form of encryption. a. true b. false
false
some viruses are considered to be benign a. true b. false
false
spooling is a security threat that relies on cleartext transmission whereby the assailant falsifies the IP addresses of an internet server by changing the address recorded in packets it sends over the internet a. true b. false
false
the lower half of the virtual address space is accessible only to kernel-mode processes a. true b. false
false
the open mode attribute for a file indicates whether other callers can open the file for read,write, or delete operations while this caller is using it a. true b. false
false
when a process requests pages, Linux loads them into memory. When the Kernel needs the memory space, the pages are released using a most recently used (MRU) algorithm a. true b. false
false
windows XP was the last windows operating system build o the windows 95 kernel a. true b. false
false
windows is a non-preemptive multitasking, multithreaded operating system a. true b. false
false
wiretapping involves the capability of authorized users to search through storage, directories, or files for private information a. true b. false
false
Before the 1995 release of the windows 95 operating system, all windows products were merely graphical user interfaces that required the MS-DOS operating system to perform tasks a. true b. false
true
Linux has system calls that change the size of the process data segment, either by expanding it to accommodate extra data values or reducing it when certain values positioned at the end of the data segment are no longer needed. a. true b. false
true
a continuing series of security awareness and ethics communications to computer users is more effective than a single announcement a. true b. false
true
a replacement paging policy determines which virtual page must be removed from memory to make room for a new page a. true b. false
true
a virus is defined as a small program written to alter the way a computer operates, without the permission or knowledge of the user a. true b. false
true
any vulnerability at the operating system level opens the entire system to attack a. true b. false
true
at the operating system level, file mapping is typically used for file catching, loading, and running executable programs a. true b. false
true
default passwords pose unique vulnerabilities because they are widely known among system attackers but are a necessary took for vendors a. true b. false
true
in recent windows operating systems, almost all low-level I/O operations are asynchronous a. true b. false
true
one of the biggest concerns about windows operating systems is the need for aggressive patch management to combat the many viruses and worms that target these systems a. true b. false
true
one popular authentication took is Kerberos, a network authentication protocol developed as part of the Athena Project at MIT a. true b. false
true
the secure log file contains lists of all attempts to log in to the system, including the date, time, and duration of each access atempt a. true b. false
true
when Linux allocates memory space, by default it allocates one GB of high-order memory to the kernel and three GB of memory to executing porccesses a. true b. false
true
when non-synchronized processes access data records and modify some but not all of a record's fields, it is called "accidental incomplete modification of data" a. true b. false
true
