1. Message sequence numbering is used to detect missing messages in a sequence of numbers.
2. A request-response technique involves sending a control message from the sender and a response from the receiver at periodic, synchronized intervals.
3. The main task of an operating system is to allocate computer resources to users.
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
108 views
CHP3 Multiple Choice With Answers
1. Message sequence numbering is used to detect missing messages in a sequence of numbers.
2. A request-response technique involves sending a control message from the sender and a response from the receiver at periodic, synchronized intervals.
3. The main task of an operating system is to allocate computer resources to users.
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 6
CHAPTER 3
Auditing Operating System and Network
MULTIPLE CHOICE QUESTIONS (WITH ANSWERS) Micah Caraggayan 1. It is a sequence of number 2. It is a control message used to detect missing form the sender and a messages. response from the receiver are sent at a. Call-back devices periodic, synchronized b. Message transaction log intervals. c. Request-response technique d. Message sequence numbering a. Request-response technique b. Call-back devices c. Message sequence numbering d. None of the above 3. Among the choices 4. What are the techniques that a virus could use to infect system? below, which is the main The program can attach itself to: task the operating system I. An .EXE and .COM file performs? II. An .OVL program file
a. Allocates computer resources to III. The boot sector of the disk
users IV. A device driver program b. Manages organizational structure c. Translate low-level languages a. I, III and IV only
d. None of the above b. I only
c. I, II, III, IV d. none 5. It is a system that 6. Statement 1: The information in the enforces access control access token is used to approve all actions attempted by the user during between two networks. the session. Statement 2: In distributed systems, a. Firewall end users may control (own) resources. b. Virus c. Network a. False ; True
d. Program b. False ; False
c. True ; True d. True ; False 7. ___________ is the 8. Statement 1: At login, the operating system creates an access token computer equivalent of a that contains key about the user, telephone wiretap. It is a including user ID, password, user group, and privileges granted to the log that records both the user. users keystrokes and the Statement 2: Most antiviral programs systems responses to run in the background on the host computer and automatically test all them. files that are uploaded to the host.
a. Access Token a. True ; True
b. Keystroke Monitoring b. True ; False c. Event monitoring c. False ; True d. None of the choices d. False ; False 9. A ___________ accepts 10. ________ is an or denies access audit log that summarizes requests based on key activities related to filtering rules, and then users, applications, and directs the incoming calls system resources. to the correct internal a. Vaccine receiving node. b. Firewall c. Keystroke monitoring a. Network-level firewall d. Event Monitoring b. Firewall c. Application-level Firewall d. Either a or c