Question: The hardware to measure elapsed time and to trigger operations is called _ _ _ _ _ _ Question 1 6 options: PCI bus device
The hardware to measure elapsed time and to trigger operations is called
Question options:
PCI bus device driver
Virtual crontab
Programmable interval timer
Programmable interval interface
Question points
Saved
Access o d read means
Question options:
Domain o has read access to object d
Object o has read access to domain d
Domain d has read access to object o
Object d has read access on domain o
Question points
Saved
is a directory structure that allows directories to share subdirectories andor files
Question options:
Acyclic Graph Directory
TreeStructure Directory
General Graph Directory
Linear Directory
Question points
Saved
Which statement is correct out of the following
Question options:
Finegrained protection is more complex yet less protective
Roughgrain protection is less complex yet more protective
Rough grain is more protective that fine grain
Fine grain is more protective that rough grain
Question points
Saved
Computer peripherals don't use standards OS command; therefore, they rely on
Question options:
Directory structure
Device controller
Device driver
Memory management unit, MMU
Question points
Saved
Which of the following statement is correct regarding distributed computing
Question options:
Using distributed computing enables computation speedup
A company can balance seasonal traffic spike with system load sharing
Codebase has to exist and persist on every node within a distributed system
Operation managers are able to detect and recover from site failures gracefully without impacting users experience
Question points
Saved
Alice would like to have a very simple directory structure, what would be your recommendation to her?
Question options:
use raw disk structure
use simpletree directory structure
use Unix directory structure
use singlelevel directory structure
Question points
Saved
OS determines the type of operations performed on a file by using
Question options:
file extension
file path
file lock
file format
Question points
Saved
is achieved by allowing processes to access data only when they need to for a specific duration of time.
Question options:
Rolebase access control
Least privilege principle
Rulebase access control
Need to know principle
Question points
Saved
An automated attempt to connect to a range of ports in a network is known as
Question options:
nmap scan
nessus scan
brute force
port scanning
Question points
Saved
Which Access Matrix implementation is more suitable for user's protection
Question options:
Global table
Access lists
Lockkey
Capability list
Question points
Saved
allows several processes to acquire the file concurrently
Question options:
Exclusive lock
Shared lock
Advisory lock
Mandatory lock
Question points
Saved
A rightsset in a protection policy is
Question options:
A subset of all objects that can be performed by an operation
A set of all domains that can be secured by an object
A subset of all operations that can be performed on the object
A set of all processes that a domain has accessrights to
Question points
Saved
Packet switching incurs more overhead per message, but require less setup time
Question options:
True
False
Question points
Saved
VMM cycle stealing means
Question options:
native OS and guest OS are running on two different cycles
guest OS doesn't receive the CPU cycles they expect
additional binary translation is needed by the VMM
native OS don't receive the CPU cycles they expect
Question points
Saved
A potential security violation is called
Question options:
an attack
a threat
a breach
a reconnaissance
Question points
Saved
is a program that lets the operating system communicate with specific computer hardware.
Question options:
Device driver
Device controller
Directory structure
Memory management unit, MMU
Question points
Saved
Which of the following statements are false about Treestructure directory select all that applies
Question options:
Treestructure directory allows any given directory within the structure to have only files
Treestructure directory is rarely used in the enterprise.
Treestructure directory has a root directory
Both Windows and Linux allow treestructure directory
answer me all correct options from questions to and send me only correct options
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
