itec exam 3
Device management principles are changing rapidly to accommodate cloud computing.
False
Effective distributed security requires an authentication mechanism that allows a server to prove its identity to a client.
False
File names are not case sensitive in Linux
False
If a password consists of ten characters, it would take a human about 4.5 years to guess the password if the human makes one try each second.
False
In a file directory tree structure, the "leaves" of the tree are subdirectories created by the user.
False
In a file management system, information is passed from the Device Manager at the top of the hierarchy to the File Manager at the bottom.
False
Intrusion detection is an example of a strategy for improving system survivability based on knowledge gained from intrusions.
False
Linux was developed by Dennis Ritche, who wanted to create an operating system to maximize the limited capabilities of the Intel 80386 microprocessor.
False
Much of Windows is written in assembly language, a programming language that's standardized and readily available.
False
One disadvantage of Windows is that it does not provide much support for users working in non-English languages.
False
Partial network encryption, also called communications encryption, is the most extreme form of encryption.
False
RAID begins with the assumption that a small set of large-capacity disk drives is preferable to a larger set of small-capacity disk drives.
False
Some viruses are considered to be benign.
False
Spooling is a security threat that relies on cleartext transmission whereby the assailant falsifies the IP addresses of an Internet server by changing the address recorded in packets it sends over the Internet.
False
The File Manager responds to the CREATE command by creating a new file.
False
The job of the I/O control unit is to keep up with the I/O requests from the CPU and pass them down the line to the appropriate control unit.
False
When a user gives a command to modify the contents of a file, it's actually a command to access folders within the file.
False
Windows XP was the last Windows operating system built on the Windows 95 kernel.
False
Windows is a non-preemptive multitasking, multithreaded operating system.
False
Wiretapping involves the capability of authorized users to search through storage, directories, or files for private information.
False
device drivers supervise the transmission of data between main memory and local unit
False
Any vulnerability at the operating system level opens the entire system to attack.
True
At the operating system level, file mapping is typically used for file caching, loading, and running executable programs.
True
Before the 1995 release of the Windows 95 operating system, all Windows products were merely graphical user interfaces that required the MS-DOS operating system to perform tasks.
True
Blu-ray discs are available in several formats: read-only (BO-ROM), recordable (BD-R), and rewritable (BD-RE).
True
Buffers are used to synchronize the movement of data between the relatively slow I/O devices and the very fast CPU.
True
Default passwords pose unique vulnerabilities because they are widely known among system attackers but are a necessary tool for vendors
True
Direct access storage devices (DASDs) are devices that can directly read or write to an arbitrary place on a disk.
True
Directories are special files that contain listings of filenames and their attributes.
True
If the File Manager is required to provide detailed instructions for each system device (how to start it, get it to move to the correct place where the desired record is located, and when to stop), then the program is considered device dependent.
True
In public/private key encryption, the private key is a pair of two prime numbers chosen by the person who wants to receive a private message.
True
Linux brought much of the speed, efficiency, and flexibility of UNIX to small desktop computers
True
Linux is an open-source program.
True
Microsoft has recently introduced an optional file system called resilient file system, for handling files with very large data sets.
True
One of the biggest concerns about Windows operating systems is the need for aggressive patch management to combat the many viruses and worms that target these systems
True
Recent Windows operating systems provide distributed security with Kerberos, which provides authentication, data integrity, and data privacy.
True
The name Linux is contraction of Linus and UNIx
True
The primary file handling concept in recent versions of windows is the virtual file.
True
The secure log file contains lists of all attempts to log in to the system, including the date, time, and duration of each access attempt.
True
The universal serial bus (USB) controller acts as an interface between the operating system, device drivers, applications, and the devices that are attached via the USB host.
True
When using a contiguous file storage scheme, the File Manager keeps track of empty storage areas by treating them as files.
True
A field is a group of related records that can be identified by the user with a name, type, and size.
False
A firewall typically sits between a network and its individual computers
False
A gap in system security in always indicative of malicious activity.
False
A master boot record virus infects both the boot record and program files, making them especially difficult to repair.
False
A path name can be either one name or a list of names separated by dashes
False
A relative filename is a name that is selected by the file manager when the file is created
False
A volume must contain a single file.
False
An optical disc drive spins at a constant speed-this is called constant linear velocity.
False
All linux files are organized in directories that are connected to each other in a tree-like structure
True
Anyone is permitted to copy and distribute verbatim copies of the operating system, including those who want 10 customize it for release to the public.
False
A driver object can only have one device connected to it
False
A virus is defined as a small program written to alter the way a computer operates, without the permission or knowledge of the user.
True
A worm is a memory-resident program that copies itself from one system to the next without requiring the aid of an infected program file.
True
A file extension is usually two to four characters in length and is separated from the relative name by a period.
True
A macro virus infects data files, such as word processing documents and spread sheets, though newer versions now infect other program files as well.
True
A single computer without access to e-mail or the Internet is easy to protect and has a low risk of attack.
True
A subdirectory is created when a user opens an account to access the computer system.
True
