Question: Question 3 6 ( 1 . 2 5 points ) _ _ _ _ _ _ _ refers to data transfers initiated by a CPU

Question 36(1.25 points)
_______ refers to data transfers initiated by a CPU under driver software control to access registers or memory on a device.
Question 36 options:
Data-out registers
Programmed I/O
Status registers
Data-in registers
Question 37(1.25 points)
A common OS design is to allow I/O calls performed via system calls... why?
Question 37 options:
system calls are faster
to enforce sync between CPU & I/O controller device
system calls are less erroneous
to enforce I/O protection
Question 38(1.25 points)
Device controller Present uniform device-access interface to I/O subsystem.
Question 38 options:
True
False
Question 39(1.25 points)
Linux, Windows, Android has its own I/O subsystem structures and device driver frameworks
Question 39 options:
True
False
Question 40(1.25 points)
______ is achieved by giving programs, users, and systems just enough privileges to perform their tasks only.
Question 40 options:
Need to know principle
Least privilege principle
Role-base access control
Rule-base access control
Question 41(1.25 points)
It is impossible to have a 100% secure system
Question 41 options:
True
False
Question 42(1.25 points)
The goal of OS protection is
Question 42 options:
Ensure that each object is accessed correctly and only by the allowed processes
Ensure that each object has a name
Ensure that each object is related to specific hardware and/or software
Ensure that each object has a secure address
Question 43(1.25 points)
Application-layer attack is measured in bit per second
Question 43 options:
True
False
Question 44(1.25 points)
Which Access Matrix implementation is more suitable for process protection
Question 44 options:
Global table
Access lists
Lock-key
Capability list
Question 45(1.25 points)
Where does the File-system resides on?
Question 45 options:
I/O
Cach
Memory
Disk
Question 46(1.25 points)
Disk must be subdivided into partitions
Question 46 options:
True
False
Question 47(1.25 points)
OS assigns an address to every I/O device
Question 47 options:
True
False
Question 48(1.25 points)
Memory oversubscription in virtualization is best defined as when the subscribed resources exceed those allocated which requires extra management efficiency from VMM
Question 48 options:
True
False
Question 49(1.25 points)
Which of the following are considered valid file operations (select all that apply):
Question 49 options:
Create
Truncate
Delete
Reposition
Question 50(1.25 points)
A massive amount of bogus traffic hit a web server is called ________
Question 50 options:
volume-based DDoS attack
network-layer DDos attack
Phishing attack
application-layer DDoS attack
Question 51(1.25 points)
A system where the user is not aware of the multiplicity of the machine is best described as _____
Question 51 options:
A virtual system Type2 hypervisor
A Distributed-operating system
A Network-operating system
A Multicore bases system
Question 52(1.25 points)
OS tracks open files via ______.
Question 52 options:
OS kernel
file pointer
open-file table
file-open count
Question 53(1.25 points)
A ________ is a collection of nodes containing information about all files
Question 53 options:
partition
directory
metadata
file tree
Question 54(1.25 points)
Which of the following examples represent a domain switching (select all that apply)
Question 54 options:
When one user logs out and another user logs in (aka user change)
When a CPU switches from one process to another
When a procedure call is made
When memory swap occurs
Question 55(1.25 points)
______hardware device used to bypasses CPU to transfer data directly between I/O device and memory
Question 55 options:
Device controller
Programmed I/O
Interrupt driven I/O
DMA controller
Question 56(1.25 points)
The most common method to access a file is___
Question 56 options:
direct access
access control list (ACL)
sequential access
read-only access
Question 57(1.25 points)
A relative pathname in a tree directory structure begins at the root and follows a path down to the specified file, giving the directory names on the path.
Question 57 options:
True
False
Question 58(1.25 points)
________ is a collection of loosely coupled processors interconnected by a communications network
Question 58 options:
Distributed system
Multicore processor
Remote method invocation
Application Programmable interface
Question 59(1.25 points)
Intercept an already-established session between a client and a server is called ______
Question 59 options:
reply attack
session hijacking
man-in-the middle attack
brute force attack
answer 36-60 correctly only send me options

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!