click below
click below
Normal Size Small Size show me how
S3 - App OS
| Question | Answer |
|---|---|
| _______ was used as an early secondary-storage medium, but the access time is much slower than for disks. | Magnetic Tape |
| Modern disks are addressed as large one-dimensional arrays of logical blocks, where the ______ is the smallest unit of transfer. | Logical Block |
| One of the earliest secondary-storage media is the _______. | Magnetic Tape |
| It is a way to read and write data on disks, where the density of bits (bits/unit length) per track is uniform. | Constant Linear Velocity |
| A typical hard disk have a rotation speed from __ | 4500 to 7200 |
| A _______ has a separate read-write head for each track. | Fixed-head system |
| The system stores information by recording it ______ on the sector under the read-write head. | Magnetically |
| It is the time it takes for the sector to rotate under the head. | Latency time |
| It provides the bulk of secondary storage for modern computer systems. | Magnetic Disk |
| A ________ movable-head system has only one read-write head per surface and the system moves the head to access a particular track | Movable-Head system |
| The Shortest Seek Time First disk scheduling selects the request with the maximum seek time from the current head position. | FALSE |
| The Shortest Seek Time First disk scheduling selects the request with the minimum seek time from the current head position. | TRUE |
| The OS can improve on the average disk service time by scheduling the requests for disk access. | TRUE |
| LOOK disk scheduling algorithm is sometimes called the elevator algorithm | TRUE |
| The Look disk scheduling selects the request with the minimum seek time from the current head position. | FALSE |
| Compute for the total head movement (THM) of the R/W Head 39, 14, 38, 17. The read write head is positioned at location 10. Compute for the total head movement for a 100 (0 - 99) track disk for each disk scheduling algorithm. Using SSTF, how many THM? | 29 tracks |
| Compute for the total head movement (THM) of the R/W Head 98, 53, 22, 16, 24. The read write head is positioned at location 32. Total head movement for a 100 (0 - 99) track disk for each disk scheduling algorithm. Using C-LOOK ) How many THM? | 143 tracks |
| The disk queue compute for the total head movement (THM) of the R/W Head 39, 14, 38, 17. The read write head is positioned at location 10. The total head movement for a 100 (0 - 99) track disk for each disk scheduling algorithm. Using SCAN. How many THM? | 49 tracks |
| The disk queue compute for the total head movement (THM) of the R/W Head 98, 53, 22, 16, 24. The read write head is positioned at location 32. The total head movement for a 100 track disk for each disk scheduling algorithm. Using SCAN, | Tack 98 |
| In a disk the information is recorded on the __ | Surface |
| Since most jobs depend heavily on the disk for loading and input and output files, it is important that disk service be as fast as possible. | TRUE |
| In C-SCAN scheduling, when it reaches the other end, it immediately returns to the beginning of the disk without servicing any requests on the return trip. | TRUE |
| C-SCAN scheduling essentially treats the disk as though it were circular where the last track is adjacent to the first one. | TRUE |
| SCAN disk scheduling algorithm is sometimes called the elevator algorithm | TRUE |
| F6 | F6 |
| Which among the given is a vulnerability of a single computer without e-mail or internet? | Compressed Passwords |
| “Sniffers” is a vulnerability of a LAN connected (with internet). | FALSE |
| What is the “Relative risk” of a LAN connected with internet? | High |
| LAN connected (without internet) is vulnerable to “spoofing”. | TRUE |
| Which of the following example strategies does not belong to the key property “Recovery of essential and full services after attack”? | Authentication |
| “Adaptation and evolution to reduce effectiveness of future attacks” is described as_________. | Strategies for improving system survivability based on knowledge retrieved from attacks. |
| Which of the configurations is vulnerable to “Spoofing”? | LAN connected with or without Internet |
| Virus” is a vulnerability of which configuration? | All of these (Single Computer (without E-mail or internet, LAN connected with internet, Laptop with E-mail) |
| “E-mail” is a vulnerability of which configuration? | LAN connected (with internet) |
| What is the “Relative risk” of a LAN connected without internet? | Medium |
| Hoax site is an example of spoofing | TRUE |
| Vishing is similar to smishing except that the victims receive a voice mail telling them to call a phone number or access a website. | TRUE |
| Any breach of security or modification of data that was not the result of a planned intrusion. | Unintentional intrusions |
| Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. | TRUE |
| A type of virus which is triggered by a specific time | Time Bomb |
| Hardware malfunction is an example of: | Unintentional Intrusion |
| Which of the given is an example of unintentional attack? | Hardware malfunction |
| These refer to entering systems by guessing authentic passwords. | Repeated trials |
| Which of the given is not an example of unintentional attack? | Al of these (Trojan horse , Phishing , Wiretapping) |
| Refers to the use of discarded materials such as disks, CDs, printout, etc., to enter the system legally. | Trash Collection |
| “Sniffers” is not a vulnerability of a LAN connected (with internet). | TRUE |
| Which among the given is not a vulnerability of a LAN connected with internet? | None of the these (LAN connected (without internet) , Single Computer (without E-mail or internet), LAN connected (with internet)) |
| Which of the following example strategies does not belong to the key property “Recover of essential and full services after attack”? | All of these Encryption, Intrusion detection, Authentication) |
| Which of the following example strategies belong to the key property “Adaptation and evolution to reduce effectiveness of future attacks”? | Intrusion recognition patterns |
| It is the capability of a system to fulfill its mission, in a timely manner, in the presence of attacks, failures or accidents | System Survivability |
| Which of the given is considered as system vulnerabilities | All of these (Vulnerable firewalls, Email exchange, File downloads) |
| Infects files on the computer, normally executable files (.exe and .com) commonly found on Microsoft operating systems. | File infector virus |
| __________ are programs that reside on computers attached to the network. | None of these (Phishing, Brute force attack, Rootkits) |
| Spoofing can be applied to emails, phone calls, and websites | TRUE |
| Repeated trials is also known as Brute Force Attack | TRUE |
| File infector virus infects files on your computer. | TRUE |
| A type of virus which is triggered by a certain event like keystroke | Logic Bomb |
| Boot sector virus infects the boot record, the system area of a floppy disk or a hard drive. | TRUE |
| Worm is a program to use to enhance the speed of your computer. | FALSE |
| Windows 10 is an example of hand-held operating system | FALSE |
| Any vulnerability at the _________ level opens the entire system to attack. | Operating system |
| The “Ease of protection” of a LAN connected (with internet) is “Medium”. | FALSE |
| __________ plays a key role in computer system security. | Operating System |
| What is the “ease of protection” of a single computer without e-mail or internet? | High |
| “Recovery of essential and full services after attack” is described as _______. | Strategies for limiting damage |
| “E-mail” is a vulnerability of LAN connected (with internet). | TRUE |
| These refers to an unspecified and undocumented entry point to the system. | Trap doors |
| Ransomware is a malware that demands a fee or ransom. | TRUE |
| Antivirus softwares combat viruses. | TRUE |
| Spear-phishing is variation of phishing In which the phishing sends fake emails to a certain employee of an organization. | TRUE |
| Small programs written to alter the way a computer operates, without permission of the user. | Virus |
| Hoax Sites are used when unauthorized users want to disguise themselves as friendly sites. | TRUE |
| Antivirus software can remove all impurities from your computer. | FALSE |
| Vishing is a type of phishing that involves the use of short messages service (SMS) texting. | FALSE |
| Which of the configurations is vulnerable to “Sniffers”? | LAN connected with or without Internet |
| Which of these are the key properties of a survivable system? | All of the above (Recovery of essential services after an attack, Resistance to attacks, Recognition of attacks and resulting damage) |
| Which of the given is an example strategy of the key property “Recognition of attack and damage”? | Intrusion detection |
| Which among the given is not a vulnerability of a single computer without e-mail or internet? | Sniffers |
| ___________ must be on guard to arm their operating systems with all available defense against attack | System Administrators |
| Firewalls are important for security. | TRUE |
| Malicious or not, a breach of security severely damages the system’s credibility | TRUE |
| Sniffers are programs that reside on computer attached to the network | TRUE |
| Ransomware is similar to smishing except that the victims receive a voice mail telling them to call a phone number or access a website. | FALSE |
| Infects data files (such as word processing documents, spreadsheets, etc.) | Macro Virus |
| The “Ease of protection” of a LAN connected (with Internet) is “High”. | FALSE |
| The more complex and powerful the ________, the more likely it is to have vulnerabilities to attack. | Operating system |
| Works by attaching itself to a template (such as NORMAL.DOT), which in turn is attached to word processing documents. | Macro Virus |
| _________ is one in which a malicious hacker takes over computers via the internet and causes them to flood a target site with demands for data and other small tasks causing a computer to perform repeated unproductive task. | Denial of Service (DoS) attack |
| Worm is an example of Blended Threat. | TRUE |
| Which of the given is an example strategy of the key property “Recover of essential and full services after attack”? | Contingency planning |
| Unauthorized user monitors or modifies a user’s transmission. | Wire tapping |
| LAN connected (without internet) is vulnerable to “sniffers”. | TRUE |
| What is the “ease of protection” of a LAN connected without Internet? | Medium |
| Which of the following is an example strategy of the key property “Adaptation and evolution to reduce effectiveness of future attacks”? | Intrusion recognition patterns |
| Security breach can happen due to uneducated users and unauthorized access to system resources | TRUE |
| To be called a virus, one must be self-executing and __________. | Self-replicating |
| Security breach is a gap in system security that can be malicious or not. | TRUE |