itec exam 3

Ace your homework & exams now with Quizwiz!

Device management principles are changing rapidly to accommodate cloud computing.

False

Effective distributed security requires an authentication mechanism that allows a server to prove its identity to a client.

False

File names are not case sensitive in Linux

False

If a password consists of ten characters, it would take a human about 4.5 years to guess the password if the human makes one try each second.

False

In a file directory tree structure, the "leaves" of the tree are subdirectories created by the user.

False

In a file management system, information is passed from the Device Manager at the top of the hierarchy to the File Manager at the bottom.

False

Intrusion detection is an example of a strategy for improving system survivability based on knowledge gained from intrusions.

False

Linux was developed by Dennis Ritche, who wanted to create an operating system to maximize the limited capabilities of the Intel 80386 microprocessor.

False

Much of Windows is written in assembly language, a programming language that's standardized and readily available.

False

One disadvantage of Windows is that it does not provide much support for users working in non-English languages.

False

Partial network encryption, also called communications encryption, is the most extreme form of encryption.

False

RAID begins with the assumption that a small set of large-capacity disk drives is preferable to a larger set of small-capacity disk drives.

False

Some viruses are considered to be benign.

False

Spooling is a security threat that relies on cleartext transmission whereby the assailant falsifies the IP addresses of an Internet server by changing the address recorded in packets it sends over the Internet.

False

The File Manager responds to the CREATE command by creating a new file.

False

The job of the I/O control unit is to keep up with the I/O requests from the CPU and pass them down the line to the appropriate control unit.

False

When a user gives a command to modify the contents of a file, it's actually a command to access folders within the file.

False

Windows XP was the last Windows operating system built on the Windows 95 kernel.

False

Windows is a non-preemptive multitasking, multithreaded operating system.

False

Wiretapping involves the capability of authorized users to search through storage, directories, or files for private information.

False

device drivers supervise the transmission of data between main memory and local unit

False

Any vulnerability at the operating system level opens the entire system to attack.

True

At the operating system level, file mapping is typically used for file caching, loading, and running executable programs.

True

Before the 1995 release of the Windows 95 operating system, all Windows products were merely graphical user interfaces that required the MS-DOS operating system to perform tasks.

True

Blu-ray discs are available in several formats: read-only (BO-ROM), recordable (BD-R), and rewritable (BD-RE).

True

Buffers are used to synchronize the movement of data between the relatively slow I/O devices and the very fast CPU.

True

Default passwords pose unique vulnerabilities because they are widely known among system attackers but are a necessary tool for vendors

True

Direct access storage devices (DASDs) are devices that can directly read or write to an arbitrary place on a disk.

True

Directories are special files that contain listings of filenames and their attributes.

True

If the File Manager is required to provide detailed instructions for each system device (how to start it, get it to move to the correct place where the desired record is located, and when to stop), then the program is considered device dependent.

True

In public/private key encryption, the private key is a pair of two prime numbers chosen by the person who wants to receive a private message.

True

Linux brought much of the speed, efficiency, and flexibility of UNIX to small desktop computers

True

Linux is an open-source program.

True

Microsoft has recently introduced an optional file system called resilient file system, for handling files with very large data sets.

True

One of the biggest concerns about Windows operating systems is the need for aggressive patch management to combat the many viruses and worms that target these systems

True

Recent Windows operating systems provide distributed security with Kerberos, which provides authentication, data integrity, and data privacy.

True

The name Linux is contraction of Linus and UNIx

True

The primary file handling concept in recent versions of windows is the virtual file.

True

The secure log file contains lists of all attempts to log in to the system, including the date, time, and duration of each access attempt.

True

The universal serial bus (USB) controller acts as an interface between the operating system, device drivers, applications, and the devices that are attached via the USB host.

True

When using a contiguous file storage scheme, the File Manager keeps track of empty storage areas by treating them as files.

True

A field is a group of related records that can be identified by the user with a name, type, and size.

False

A firewall typically sits between a network and its individual computers

False

A gap in system security in always indicative of malicious activity.

False

A master boot record virus infects both the boot record and program files, making them especially difficult to repair.

False

A path name can be either one name or a list of names separated by dashes

False

A relative filename is a name that is selected by the file manager when the file is created

False

A volume must contain a single file.

False

An optical disc drive spins at a constant speed-this is called constant linear velocity.

False

All linux files are organized in directories that are connected to each other in a tree-like structure

True

Anyone is permitted to copy and distribute verbatim copies of the operating system, including those who want 10 customize it for release to the public.

False

A driver object can only have one device connected to it

False

A virus is defined as a small program written to alter the way a computer operates, without the permission or knowledge of the user.

True

A worm is a memory-resident program that copies itself from one system to the next without requiring the aid of an infected program file.

True

A file extension is usually two to four characters in length and is separated from the relative name by a period.

True

A macro virus infects data files, such as word processing documents and spread sheets, though newer versions now infect other program files as well.

True

A single computer without access to e-mail or the Internet is easy to protect and has a low risk of attack.

True

A subdirectory is created when a user opens an account to access the computer system.

True


Related study sets

Chapter 11.4: Aplia Assignment Adding Value to Professional Teams

View Set

Anatomy and Physiology of the Circulatory System: Chapter 4 Exam

View Set

Anatomy 5 - Femur, Patella, Tibia, Fibula & Foot

View Set

Honors Chemistry Chapter 11 Assessment

View Set

Advanced MS - Chapter 36 & 37 WB

View Set

Chapter 14: The Courts Vocabulary

View Set