Question: Question 3 6 ( 1 . 2 5 points ) _ _ _ _ _ _ _ refers to data transfers initiated by a CPU
Question points
refers to data transfers initiated by a CPU under driver software control to access registers or memory on a device.
Question options:
Dataout registers
Programmed IO
Status registers
Datain registers
Question points
A common OS design is to allow IO calls performed via system calls... why?
Question options:
system calls are faster
to enforce sync between CPU & IO controller device
system calls are less erroneous
to enforce IO protection
Question points
Device controller Present uniform deviceaccess interface to IO subsystem.
Question options:
True
False
Question points
Linux, Windows, Android has its own IO subsystem structures and device driver frameworks
Question options:
True
False
Question points
is achieved by giving programs, users, and systems just enough privileges to perform their tasks only.
Question options:
Need to know principle
Least privilege principle
Rolebase access control
Rulebase access control
Question points
It is impossible to have a secure system
Question options:
True
False
Question points
The goal of OS protection is
Question options:
Ensure that each object is accessed correctly and only by the allowed processes
Ensure that each object has a name
Ensure that each object is related to specific hardware andor software
Ensure that each object has a secure address
Question points
Applicationlayer attack is measured in bit per second
Question options:
True
False
Question points
Which Access Matrix implementation is more suitable for process protection
Question options:
Global table
Access lists
Lockkey
Capability list
Question points
Where does the Filesystem resides on
Question options:
IO
Cach
Memory
Disk
Question points
Disk must be subdivided into partitions
Question options:
True
False
Question points
OS assigns an address to every IO device
Question options:
True
False
Question points
Memory oversubscription in virtualization is best defined as when the subscribed resources exceed those allocated which requires extra management efficiency from VMM
Question options:
True
False
Question points
Which of the following are considered valid file operations select all that apply:
Question options:
Create
Truncate
Delete
Reposition
Question points
A massive amount of bogus traffic hit a web server is called
Question options:
volumebased DDoS attack
networklayer DDos attack
Phishing attack
applicationlayer DDoS attack
Question points
A system where the user is not aware of the multiplicity of the machine is best described as
Question options:
A virtual system Type hypervisor
A Distributedoperating system
A Networkoperating system
A Multicore bases system
Question points
OS tracks open files via
Question options:
OS kernel
file pointer
openfile table
fileopen count
Question points
A is a collection of nodes containing information about all files
Question options:
partition
directory
metadata
file tree
Question points
Which of the following examples represent a domain switching select all that apply
Question options:
When one user logs out and another user logs in aka user change
When a CPU switches from one process to another
When a procedure call is made
When memory swap occurs
Question points
hardware device used to bypasses CPU to transfer data directly between IO device and memory
Question options:
Device controller
Programmed IO
Interrupt driven IO
DMA controller
Question points
The most common method to access a file is
Question options:
direct access
access control list ACL
sequential access
readonly access
Question points
A relative pathname in a tree directory structure begins at the root and follows a path down to the specified file, giving the directory names on the path.
Question options:
True
False
Question points
is a collection of loosely coupled processors interconnected by a communications network
Question options:
Distributed system
Multicore processor
Remote method invocation
Application Programmable interface
Question points
Intercept an alreadyestablished session between a client and a server is called
Question options:
reply attack
session hijacking
maninthe middle attack
brute force attack
answer correctly only send me options
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
