Exam 16: Security
Exam 1: Introduction57 Questions
Exam 2: Operating-System Structures42 Questions
Exam 3: Processes55 Questions
Exam 4: Threads Concurrency59 Questions
Exam 5: Cpu Scheduling57 Questions
Exam 6: Synchronization Tools61 Questions
Exam 7: Synchronization Examples57 Questions
Exam 8: Deadlocks40 Questions
Exam 9: Main Memory58 Questions
Exam 10: Virtual Memory54 Questions
Exam 11: Mass-Storage Structure46 Questions
Exam 12: Io Systems30 Questions
Exam 13: File-System Interface50 Questions
Exam 14: File-System Implementation36 Questions
Exam 15: File-System Internals25 Questions
Exam 16: Security32 Questions
Exam 17: Protection32 Questions
Select questions type
User authentication can be based on_______________
Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
B
MS Word documents in RTF format are resistant to macro viruses.
Free
(True/False)
5.0/5
(31)
Correct Answer:
True
It is much faster for a computer to encode and decode ciphertext by using the usual symmetric algorithms than by using asymmetric algorithms.
Free
(True/False)
4.8/5
(39)
Correct Answer:
True
In a symmetric encryption algorithm, one key is used to encrypt and a different one is used to decrypt.
(True/False)
4.9/5
(40)
________________ encrypts the information on the target computer and renders it inaccessible to the owner
(Multiple Choice)
4.9/5
(42)
To protect the systems we have to ensure security on the following level:
(Multiple Choice)
4.9/5
(37)
When a user logs on, MW Windows 10 creates a list of files which can be used by the user.
(True/False)
4.8/5
(34)
Transport Layer Security (TLS) employs server's certificate from certification authority (CA).
(True/False)
4.8/5
(33)
______________ virus changes each time it is installed to avoid detection by antivirus software.
(Multiple Choice)
4.8/5
(34)
The attack surface is the set of points at which an attacker can try to break into the system.
(True/False)
4.7/5
(34)
Showing 1 - 20 of 32
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)