Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Operating System Expert

problem1. Administrators currently use telnet to remotely manage several servers. Security policy dictates that passwords and administrative activities must not be communicated in clear text. Which of the following is the best alternative to using telnet?

A. DES (Data Encryption Standard)
B. PKI (Public Key Infrastructure)
C. SSH (Secure Shell)
D. S-Telnet
 
problem2. The goal of TCP (Transmission Control Protocol) hijacking is:

A. identifying the TCP (Transmission Control Protocol) port for future exploitation
B. identifying source addresses for malicious use
C. taking over a legitimate TCP (Transmission Control Protocol) connection
D. predicting the TCP (Transmission Control Protocol) sequence number
 
problem3. In order for User A to send User B an e-mail message that only User B can read, User A must encrypt the e-mail with which of the following keys?

A. User A's private key
B. User B's private key
C. User A's public key
D. User B's public key

problem4. A block cipher is an ex of which of the following encryption algorithms?

A. symmetric key
B. public key
C. asymmetric key
D. unkeyed

problem5. A need to know security policy would grant access based on:

A. loss of privilege
B. less privilege
C. least privilege
D. single privilege
 
problem6. What is the major reason that social engineering attacks succeed?

A. multiple logins are allowed
B. lack of security awareness
C. strong passwords are not required
D. audit logs are not monitored frequently
 
problem7. One purpose of a proxy server is to:

A. translate IP (Internet Protocol) addresses into user friendly names
B. hide the public network from internal hosts
C. use one public IP (Internet Protocol) address on the internal network as a name server
D. hide internal hosts from the public network

problem8. What is the name of an encryption system which uses the same key to encrypt and decrypt a message?

A. Diffie-Hellman
B. IDEA
C. SHA
D. MD5
 
problem9. The originator of a message derives a hash and encrypts it with its private key. The encrypted hash is attached to the message and forwarded to the remote end. At the remote end, the encrypted hash is decrypted using the originator's public key. If the decrypted hash matches the re-computed hash, the message is genuine. What is being described?

A. The use of a digital signature for origin authentication
B. The incorrect use of a hash
C. Use of digital signature for data encryption
D. Public key encryption for enhanced secrecy of data
 
problem10. Which access control security model supports the following statement?  “If user A has a lower security level than the clearance level of the object, the user has no access to the object.”

A. Discretionary Access Control
B. Role Based Access Control
C. Mandatory Access Control
D. Non-Discretionary Access Control

Operating System, Computer Science

  • Category:- Operating System
  • Reference No.:- M95534

Have any Question? 


Related Questions in Operating System

1 from this book you have learned a little about the

1. From this book, you have learned a little about the different file systems inWindows and Linux. To get a better handle on the differences between them, write a short memo describing three properties of each of these f ...

Operating system assignmentpart onetopic- operating system

Operating System Assignment Part One Topic- Operating system support for mobile computing Submission Rquirements Project Proposal 1 page 1- Pages - 8 to 10 2- Power point slides 3-The project description document which e ...

Unikernelas part of the big picture of kernel design take a

UNIKERNEL As part of the big picture of kernel design, take a look at the attached article. In this course, we have not yet covered some of the OS components that are integral to discussing the benefits and detriments of ...

Operating systems assignmentwe have just 3 processes p1 p2

Operating Systems Assignment We have just 3 processes, P1, P2 and P3, and they arrive at 1, 15 and 23 milliseconds respectively, and they each have two CPU Burst as follows (there are no I/O Bursts). P1: 10 3 P2: 5 12 P3 ...

Questionin the context of the os design discussions there

Question: In the context of the OS design discussions there is a dependence on the goal of the system and the environment. This is a very important aspect of any systems design. One can argue for or against a function, b ...

Programming assignment lab schedulerdispatcheryou are to

Programming Assignment Lab: Scheduler/Dispatcher You are to implement a Scheduler in C, C++ and submit the source code, which we will compile and run. Both are to be delivered to the TA as source code through NYU Classes ...

Please address the followingprovide one advantage or one

Please address the following: Provide ONE advantage or ONE disadvantage of a Microkernel OS Design or a Monolithic OS Design. Provide support (back up your claims) for your view. The following are examples with proper ju ...

This research paper will focus on issues and concerns with

This research paper will focus on issues and concerns with Patch Management. With the advent of many types of software and systems, patch management is major nightmare. Patching the system may cause the system to crash, ...

Assignmentinsecurity controlshave you ever walked on a new

Assignment (In)security Controls Have you ever walked on a new sidewalk? If so, you might have noticed how clean and smooth it was. You also might have been impressed with how seemingly impenetrable it was. If you were t ...

1 write a shell script lab2q1sh to do the followingacreate

1. Write a shell script (lab2_q1.sh) to do the following: a. Create list1.txt (use echo command) as: Football Basketball Skates Soccer ball Golf ball Shoes b. Create list2.txt (use echo command) as: Football Basketball S ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen