OS Chapter 10-11

Ace your homework & exams now with Quizwiz!

A ____ server hides important network information from outsiders by making the network server invisible. a. proxy b. fire c. redirection d. blocking

a. proxy

When an application tries to access a page that is not in memory, a ____ occurs and the Memory Manager automatically brings that page into memory.. a. page request b. demand page c. page allocation d. page fault

d. page fault

It will take a computer ____ to crack a password with a length of three characters if the computer tries one million values per second. a. .008788 seconds b. 4.5 seconds c. 2.5 hours d. 58 hours

a. .008788 seconds

In an object-based DO/S, if the local device manager cannot satisfy a user's request, the request is sent to ____. a. another device manager b. the heap c. a central controller d. a waiting queue

a. another device manager

In a distributed system, there is a high level of cooperation and sharing of actions and data maintained by the sites when determining which process should be loaded and where it should be run; this is accomplished by ____. a. exchanging messages among site operating systems b. sending requests directly to queues c. managing all communication within a central controller d. communication among dispatchers at the sites

a. exchanging messages among site operating systems

In process-based DO/S, resources are controlled by servers called ____ that are responsible for accepting requests for service on the individual devices they control, processing each request fairly, providing service to the requestor, and returning to serve others. a. guardians b. nodes c. kernels d. spoolers

a. guardians

The focus of a network operating system is ____. a. sharing resources b. running programs c. managing users d. providing security

a. sharing resources

To control demands on memory in a DO/S, the Memory Manager handles requests from the Process Manager to allocate and deallocate space based on ____. a. the network's usage patterns b. the priority of the node generating the request c. the priority of each process d. a round robin scheduling algorithm

a. the network's usage patterns

The object used by the Kerberos protocol to provide client verification is known as a ____. a. ticket b. passphrase c. password d. token

a. ticket

The ____ file function causes the DO/S File Manager to use a master directory with information about all files stored anywhere on the system and set up a channel to the file. a. Find and Open b. Read c. Create d. Write

a. Find and Open

Generally, ____ antivirus software compares file sizes (checking for added code when none is expected), looks for replicating instructions, and searches for unusual file activity. a. diagnostic b. firewall c. reactive d. preventive

a. diagnostic

____ peruse data packets as they pass by, examine each one for specific information, and log copies of interesting packets for more detailed examination. a. Proxy servers b. Packet sniffers c. Spoofers d. Packet filters

b. Packet sniffers

Two methods of active wiretapping are "between lines transmission" and "____." a. Trojan horse b. piggyback entry c. trap doors d. browsing

b. piggyback entry

To control resource clusters as a group, most process-based systems are configured around complex ____, which manage multiple resources or divide the work among subordinate processes. a. resource managers b. server processes c. semaphores d. scheduling algorithms

b. server processes

The capability of a system to fulfill its mission, in a timely manner, in the presence of attacks, failures, or accidents is known as ____. a. system recovery b. system survivability c. attack resistance d. attack survivability

b. system survivability

One major disadvantage of encryption is that ____. a. it is prohibitive in cost b. it increases the system's overhead c. it is often ineffective d. it is inconvenient for users

b. it increases the system's overhead

An entire system that is backed up once a week and only backs up files daily that are changed on that day is known as a(n) ____ backup.a. incremental b. layered c. phased d. recovery-based

b. layered

In a typical NOS environment, a user who wants to run a local process at a remote site must first ____. a. log on to the NOS b. log on to the local network c. send a request to the remote site to schedule the process on its system d. instruct the local system to migrate the process or data to the remote site

b. log on to the local network

____ techniques in an object-based DO/S give the system the ability to perform concurrent reads and writes, as long as the results of these actions don't jeopardize the contents of the database. a. Query processing b. Data redundancy c. Concurrency control d. Location transparency

c. Concurrency control

What configuration has the highest level of risk? a. LAN without Internet b. LAN with firewall c. LAN with Internet d. Single computer without e-mail or Internet

c. LAN with Internet

Intruders have been known to capture user passwords by using a ____ to replace the standard login program on the computer with an identical fake login that captures keystrokes. a. worm b. masquerade program c. Trojan horse d. virtual login consol

c. Trojan horse

The immediate result of a worm is ____. a. complete data loss with little chance of recovery b. a computer crash with or without a blue screen c. the slower processing time of legitimate work d. not noticeable until later

c. the slower processing time of legitimate work

Errors can occur when data values are incorrectly stored because the field isn't large enough to hold the numeric value stored there. This issue is an example of a(n) ____. a. trap door attack b. denial-of-service attack c. unintentional attack d. malicious attack

c. unintentional attack

____ involve the use of graphics and a pattern of clicks using a touch screen, mouse, or other pointing device. a. retina scanner b. fingerprint scanner c. Picture passwords d. biometric scanner

c. Picture passwords

A ____ combines into one program the characteristics of other attacks.a. Trojan Horse b. multi-thread virus c. blended threat d. worm

c. blended threat

What strategy contributes most to system recovery? a. integrity checking b. authentication c. data replication d. encryption

c. data replication

Trash collection, also known as ____, is an evening pastime for those who enjoy perusing anything and everything thrown out by system users. a. trash surfing b. digital recycling c. dumpster diving d. dumpster surfing

c. dumpster diving

A job scheduler based on process priorities and durations is an example of ____. a. queuing theory b. statistical decision theory c. estimation theory d. grouping theory

c. estimation theory

The biggest limitation of a network operating system (NOS) is ____ in terms of memory, process, device, and file management. a. lack of security b. prohibitive cost c. lack of global control d. lack of scalability

c. lack of global control

In a network operating system (NOS), ____. a. local resources are managed globally b. access control policies are globally managed c. resources are owned by local nodes d. local operations at a node are managed by the NOS

c. resources are owned by local nodes

In a network operating system (NOS), the network management functions come into play only when the system needs to use the network. At all other times, the operating system operates as if it's a(n) ____. a. process-based DO/S b. logically distributed system c. stand-alone system d. object-based DO/S

c. stand-alone system

In ____ communication schemes, the sender and receiver are linked and ready to send and receive. a. direct b. indirect c. synchronous d. asynchronous

c. synchronous

____ viruses infect data files. a. Master boot record b. Boot sector c. File infector d. Macro

d. Macro

____ is a form of social engineering whereby an intruder pretends to be a legitimate entity and contacts unwary users asking them to reconfirm their personal and/or financial information. a. Acting b. Spoofing c. Impersonating d. Phishing

d. Phishing

Using ____, a firewall reviews the header information for incoming and outgoing Internet packets to verify that the source address, destination address, and protocol are all correct. a. a proxy server b. anti-virus software c. snooping d. packet filtering

d. packet filtering

The major difference between a NOS and DO/S involves ____. a. the scalability of the network b. the cost for each installation c. the capabilities provided by the local operating system d. the management of local and global resources

d. the management of local and global resources

In a DO/S, the ____ is responsible for process synchronization mechanisms and communication support. a. network manager b. central controller c. the responsibility is shared among sites d. kernel

d. kernel

For each node in a DO/S, the Memory Manager uses a kernel with a ____ algorithm to track the amount of memory that is available a. turning b. stacking c. sharing d. paging

d. paging

Typically, a DO/S system's scheduling function has three parts: a ____, a priority function, and an arbitration rule. a. scheduling request b. decision mode c. request queue d. request evaluator

b. decision mode

A process-based DO/S must synchronize actions across the network. When a process reaches a point at which it needs service from an external source, such as an I/O request, it sends a message searching for the service. While it waits for a response, the processor server puts the process in a ____ state. a. RESPONSE b. WAIT c. STOP d. BUSY

b. WAIT


Related study sets

Skills Lesson: Proposing Logical Alternatives

View Set

IDS 3138 Cannabis and its impact - Cannabis and the Body Quiz 3 study guide

View Set

21.9 - Regulation of mean arterial pressure

View Set

Abeka Consumer Mathematics Quiz 5

View Set

9.1.12 - Malware (Practice Questions), Certified Ethical Hacker Pro, Ch 14 Ethical Hacker Pro, All Chapters

View Set

Patient Assessment paramedic hocking

View Set

Monopolistic Competition and Oligopoly

View Set