Computer basic input and output system

Assignment Help Basic Computer Science
Reference no: EM133032583

Question 1. Which of the following are the CIA properties? (Select the three correct properties.)

Authentication

Confidentiality

Integrity

Availability

Identity

Implementation

Question 2. Which of the following is an example of a rule-based security decision?

Locking a car's ignition

Performing a step-by-step security analysis

Applying "security theater"

Trying to outdo a neighbor's security measures

Question 3. We are estimating the impact of an individual attack. Which of the following has the greatest estimated impact?

An attack with a $100 loss that could happen once a week

An attack with a $400 loss that could happen once a month

An attack with a $2000 loss that could happen twice a year

An attack with a $5000 loss that could happen once a year

Question 4. Risk Management Framework is a way to assess _______________ risks when developing large-scale computer systems.

Question 5. What is a worm?

Malware

Sends spam

Blocks flow of computer traffic

Denial of service

Question 6. True or False? Once we have filled in the attack likelihoods and impacts, we compute the significance by multiplying these values together.

True

False

Question 7. An attempt by a threat agent to exploit assets without permission is referred to as

An attack

A vulnerability

A safeguard

A trade-off

Question 8. The primary element on a computer motherboard that runs programs and makes the computer work is

Random access memory (RAM)

An input/output (I/O) circuit

The central processing unit (CPU)

Firmware

Question 9. ____________ flaws in the software, such as finger service, are often exploited.

Buffer overflow

Blue screen of death

Shell shock

Windows

Question 10. What is the name of the worm that was written in 1988 that could replicate itself across computers on the internet?

Gates

Jobs

Moore

Morris

Question 11. True or False? Not all data is strictly numerical.

True

False

Question 12. The __________ board contains slots or sockets for random access memory (RAM).

Mother

Father

Daughter

Son

Question 13. True or False? A computer's basic input/output system (BIOS) is a computer program stored in read-only memory (ROM).

True

False

Question 14. True or False? By the late 1980s, some virus writers were inclined toward destruction. The Jerusalem virus, which appeared in 1987 in the city of Jerusalem, contained a "destructive payload" that would delete all executable files on the system on Friday the 13th, starting in 1988.

True

False

Question 15. The term _________ was used in operating systems research to describe the access rights a particular subject or process had for a particular object or resource.

Cluster

Permission

Capability

Objects

Question 16. The "X" permission on the file indicates that the user has _________ right.

Question 17. True or False? Every executable file begins with a "file header" that describes the structure and format of the program.

True

False

Question 18. An interpreter is a program that interprets the text of a program in a symbolic form and performs the actions specified in the text. The following are examples of interpreters, except

C++

PHP

Javascript

Lisp

Question 19. True or False? In a default permit, everything is allowed except sites on the prohibited list.

True

False

Question 20. An authentication system that requires the user to provide two different passwords and a fingerprint scan is an example of

Single-factor authentication

Two-factor authentication

Three-factor authentication

None of these is correct

Question 21. True or False? Authentication associates an individual with an identity.

True

False

Question 22. True or False? Two-factor authentication is using two passwords.

True

False

Question 23. True or False? Dictionary attacks differ from trial and error attacks because dictionary attacks focus on likely passwords.

True

False

Question 24. The following are fundamental strategies for authenticating people on computer systems, except

Something you know

Something you have

Something you are

Something you make

Question 25. We need to create a three-factor authentication system. The system already uses a USB device that is unlocked with the user's fingerprint. Which of the following can we add to implement three separate factors?

A file of secret information stored on the user's authorized computers

A PIN entered via a built-in PIN pad

Signature recognition

A process that requires the user's cell phone

 

Reference no: EM133032583

Questions Cloud

Cloud-based home security system : Need to design a Cloud-based Home Security System which should satisfy the below conditions. Must support at least 1 or preferably 2 home security devices
Components of composition in data visualization : Discuss the key components of composition in data visualization. Note why the components are valuable when creating visualizations.
Mobile web development option : People are using their mobile phone browsers more and more every day to find information about businesses, make product decisions
Cybersecurity threat awareness training : Imagine you are the information systems security officer at your company and are tasked with creating a cybersecurity threat awareness training.
Computer basic input and output system : A computer's basic input/output system (BIOS) is a computer program stored in read-only memory (ROM).
Domain compliance requirements : Discuss how and why a network engineer would want to implement Virtual LANs in their network. Briefly discuss the User Domain Compliance Requirements.
Major societal trends are forecasted : What other major societal trends are forecasted that will continue to shift advertising dollars to new media, and why?
Design computing solution for the infrastructure : Design an infrastructure solution using an external service provider. Design a computing solution for the infrastructure.
Malware variant : Using a Web browser, perform some research on a newer malware variant that has been reported by a major malware containment vendor.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd