answers
How can protection improve the reliability of a system?
a) By enabling users to configure a process affinity
b) By detecting errors at the interfaces between component subsystems
c) By abstracting the underlying hardware from the user space
d) By preventing an unprivileged user to disable the antivirus Ans✓✓✓-b) By
detecting errors at the interfaces between component subsystems
How do code editors and code compilers usually access files?
a) Random access
b) Relative access
c) Direct access
d) Sequential access Ans✓✓✓-d) Sequential access
How do policies and mechanisms differ?
a) Policies dictate how something will be done whereas mechanisms dictate what
should be done
b) Policies decide where something will occur whereas mechanisms decide when
something will occur
c) Policies remain the same whereas mechanisms may change from time to time
,d) Policies may change from place to place whereas mechanisms remain the same
Ans✓✓✓-d) Policies may change from place to place whereas mechanisms
remain the same
How is the array of logical blocks mapped onto the hard disk?
a) Onto the cylinders of the disk sequentially
b) Onto the cache memory of the disk
c) Onto the platter of the disk by block size
d) Onto the sectors of the disk sequentially Ans✓✓✓-d) Onto the sectors of the
disk sequentially
In Windows, what represents the shared-memory object that will enable
communication between processes?
a) A hashed page table
b) The dynamic link library
c) A memory-mapped file
d) A memory frame object Ans✓✓✓-c) A memory-mapped file
Several major retail chains are hacked and customer information is stolen,
including credit card numbers.
Which type of attack has occurred?
a) Interruption of availability
b) Denial of service
, c) Theft of service
d) Breach of confidentiality
e) Social engineering
f) Compromised integrity Ans✓✓✓-d) Breach of confidentiality
What are two key types of access permissions?
a) Remove
b) Append
c) Updated
d) List
e) Create Ans✓✓✓-b) Append
d) List
What are two valid components of a process control block (PCB)?
a) The process counter
b) The memory buffer
c) The job queue
d) The process state
e) The text section Ans✓✓✓-a) The process counter
d) The process state
What can be assigned roles when using role-based access control?