Professional Documents
Culture Documents
2. It is a control message form the sender and a response from the receiver are sent at
periodic, synchronized intervals.
a. Request-response technique c. Message sequence numbering
b. Call-back devices d. None of the above
3. Among the choices below, which is the main task the operating system performs?
a. Allocates computer resources to users c. Translate low-level languages
b. Manages organizational structure d. None of the above
4. What are the techniques that a virus could use to infect system?
The program can attach itself to:
I. An .EXE and .COM file
II. An .OVL program file
III. The boot sector of the disk
IV. A device driver program
6. Statement 1: The information in the access token is used to approve all actions attempted
by the user during the session.
Statement 2: In distributed systems, end users may control (own) resources.
8. Statement 1: At login, the operating system creates an access token that contains key
about the user, including user ID, password, user group, and privileges granted to the
user.
Statement 2: Most antiviral programs run in the background on the host computer and
automatically test all files that are uploaded to the host.
9. A ___________ accepts or denies access requests based on filtering rules, and then
directs the incoming calls to the correct internal receiving node.
10. ________ is an audit log that summarizes key activities related to users, applications, and
system resources.
a. Vaccine c. Keystroke monitoring
b. Firewall d. Event monitoring