Ask Question, Ask an Expert


Ask Operating System Expert

problem1. Administrators currently use telnet to remotely manage several servers. Security policy dictates that passwords and administrative activities must not be communicated in clear text. Which of the following is the best alternative to using telnet?

A. DES (Data Encryption Standard)
B. PKI (Public Key Infrastructure)
C. SSH (Secure Shell)
D. S-Telnet
problem2. The goal of TCP (Transmission Control Protocol) hijacking is:

A. identifying the TCP (Transmission Control Protocol) port for future exploitation
B. identifying source addresses for malicious use
C. taking over a legitimate TCP (Transmission Control Protocol) connection
D. predicting the TCP (Transmission Control Protocol) sequence number
problem3. In order for User A to send User B an e-mail message that only User B can read, User A must encrypt the e-mail with which of the following keys?

A. User A's private key
B. User B's private key
C. User A's public key
D. User B's public key

problem4. A block cipher is an ex of which of the following encryption algorithms?

A. symmetric key
B. public key
C. asymmetric key
D. unkeyed

problem5. A need to know security policy would grant access based on:

A. loss of privilege
B. less privilege
C. least privilege
D. single privilege
problem6. What is the major reason that social engineering attacks succeed?

A. multiple logins are allowed
B. lack of security awareness
C. strong passwords are not required
D. audit logs are not monitored frequently
problem7. One purpose of a proxy server is to:

A. translate IP (Internet Protocol) addresses into user friendly names
B. hide the public network from internal hosts
C. use one public IP (Internet Protocol) address on the internal network as a name server
D. hide internal hosts from the public network

problem8. What is the name of an encryption system which uses the same key to encrypt and decrypt a message?

A. Diffie-Hellman
D. MD5
problem9. The originator of a message derives a hash and encrypts it with its private key. The encrypted hash is attached to the message and forwarded to the remote end. At the remote end, the encrypted hash is decrypted using the originator's public key. If the decrypted hash matches the re-computed hash, the message is genuine. What is being described?

A. The use of a digital signature for origin authentication
B. The incorrect use of a hash
C. Use of digital signature for data encryption
D. Public key encryption for enhanced secrecy of data
problem10. Which access control security model supports the following statement?  “If user A has a lower security level than the clearance level of the object, the user has no access to the object.”

A. Discretionary Access Control
B. Role Based Access Control
C. Mandatory Access Control
D. Non-Discretionary Access Control

Operating System, Computer Science

  • Category:- Operating System
  • Reference No.:- M95534

Have any Question? 

Related Questions in Operating System

1 consider a system of 9 processes p p1 p10 associated

1. Consider a system of 9 processes, P = {p1, ..., p10} Associated with the system are 6 memory cells, M = {M1, .., M6}. The domain and range for each process is given in the following table: Process pi Domain D(pi) Rang ...

Lab-file processingobjectivesbulladd persistent data

Lab-File Processing OBJECTIVES • Add persistent data storage to your Week 4 Lab using text file input/output. PROBLEM: Stocks4U Portfolio Management System The portfolio management system you developed for Stocks4U needs ...

Question 1an important service provided by any system is

Question 1: An important service provided by any system is the ability to run a process on a predetermined schedule without human intervention. The “automation” of tasks can reduce the workload of the system administrato ...

Linux implementation proposalphelpstech llc has a new

Linux Implementation Proposal PhelpsTech, LLC. has a new research and development group - Medals. All systems in Medals will run the Linux operating system and will access resources, as well as share resources, with Phel ...

Firewall linux-a simple firewall is a filter which blocks

Firewall (Linux)- A simple firewall is a filter which blocks the packets based on the pre-defined filter rules. There are two general strategies to set-up a filter. One strategy is restrictive firewall which blocks all p ...

Purpose of this assignmentthe purpose of this written

Purpose of this assignment: The purpose of this written assignment is to verify students' knowledge on some of the topics covered in the second half of the course: The Device Handler, File management, Deadlock, UNIX/Linu ...

Operating system proposalobjectivesyour organization is

Operating System Proposal Objectives Your organization is right now researching the utilization of Linux. Your supervisor has solicited you to look into the possibility from utilizing Linux as a part of both the server a ...

Securing operating systemsin this document of 2-3 pages

Securing Operating Systems In this document of 2-3 pages, respond to the following: • Describe the specific security concerns or risks that your chosen operating system is exposed to and how you plan to mitigate the risk ...

Web server practical-1 you are required to configure and

Web Server Practical- 1) You are required to configure and test a Web server to provide web hosting services to a client computer. Install and configure a web server, serving out a default web page that you have created. ...

Assignmentmultiple-processor scheduling simulationthe goal

Assignment Multiple-Processor Scheduling Simulation The goal of this simulation is to give you some experiences using POSIX Pthreads library functions for thread creations and synchronizations. You will learn how to solv ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

A cola-dispensing machine is set to dispense 9 ounces of

A cola-dispensing machine is set to dispense 9 ounces of cola per cup, with a standard deviation of 1.0 ounce. The manuf

What is marketingbullwhat is marketing think back to your

What is Marketing? • "What is marketing"? Think back to your impressions before you started this class versus how you

Question -your client david smith runs a small it

QUESTION - Your client, David Smith runs a small IT consulting business specialising in computer software and techno

Inspection of a random sample of 22 aircraft showed that 15

Inspection of a random sample of 22 aircraft showed that 15 needed repairs to fix a wiring problem that might compromise

Effective hrmquestionhow can an effective hrm system help

Effective HRM Question How can an effective HRM system help facilitate the achievement of an organization's strate