You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

54 lines
20 KiB

id&qtp&qim&qil&qtx&qca&qia&qrm&qnxt&qprv&qalb&subj&wght&pts&flr&ded&layout&qfixed&qptsbyans&flags
os5.001&mcs&0&Y&Which one of the following best describes the purpose of an operating system?&Managing hardware and providing services to applications&Sorting large files;Managing on-line application development;Managing the tape library;&&&&a&undefined.0&&&&&1:v&&&N.
os5.002&mcs&0&Y&Which of the following IBM eServers use IRQs, I/O addresses, and DMAs as a way for the operating system to connect with the processor?&xSeries and Netfinity servers&iSeries and AS/400 servers;zSeries and S/390 servers;pSeries and RS/6000 platforms;&&&&a&undefined.0&&&&&1:v&&&N.
os5.003&mcs&0&Y&Which of the following is a false statement?&Virtual memory reduces main memory requirements per program by no more than 5 percent.&Very positive and practical results have been achieved with virtual memory environments because the 80/20 rule has proven to be reliable.;Virtual memory implementations help programmers.;&This statement is false because virtual memory reduces main storage by much more that 5 percent. &&&a&undefined.0&&&&&1:v&&&N.
os5.004&tf&0&Y&True or False? IBM eServer platforms are capable of handling concurrent transactions and providing sub-second response time, while running batch jobs to fill in any idle time.&TRUE&FALSE&&&&&undefined.0&&&&&1&&&N.
os5.005&mcs&0&N&Which one of the following did the material in this lesson suggest was a very popular and cost-effective
;security measure?&Passwords changed at regular intervals&Retina scanners;Card swipes;Security guards;&Passwords have always been a very popular and cost-effective security measure that can be supplemented with
;additional measures.&&&a&undefined.0&&&&&1:v&&&N.
os5.006&mcs&0&N&Your CIO says, "We have a lot of technology personnel who leave to pursue other opportunities. How can I be
;sure someone doesn't take some of our business files with them on their way out?" Click the best security
;rule to apply in this situation.&Restrict file access&Create an audit trail;Issue new user IDs once a month;Institute a multiple password system;&Restricting file access is a basic requirement for computer security. &&&a&undefined.0&&&&&1:v&&&N.
os5.007&mcs&0&Y&What kind of services does the operating system provide to coordinate shared resources and maintain the integrity of updated resources? &Serialization services&Timer services ;Locking services;Management services;&&&&a&undefined.0&&&&&1:v&&&N.
os5.008&tf&0&Y&True or False? The AIX kernel provides the ability to share resources simultaneously among many processes or threads and users.&TRUE&FALSE&&&&&undefined.0&&&&&1&&&N.
os5.009&tf&0&Y&True or False? A computer's operating system workload can not be prioritized using preemptive multitasking. &TRUE&FALSE&&&&&undefined.0&&&&&1&&&N.
os5.010&tf&0&Y&True or False? Virtual memory is used to optimize central storage.&TRUE&FALSE&&&&&undefined.0&&&&&1&&&N.
os5.011&mcs&0&Y&Virtual memory operating systems can keep only how much of a typical program in main memory and still meet service level objectives for the program.&20%&30%;50%;10%;&&&&a&undefined.0&&&&&1:v&&&N.
os5.012&tf&0&Y&True or False? One advantage of virtual memory is that it degrades the overall performance of the operating system. &FALSE&TRUE&The degrading of the overall performance of the operating system is a disadvantage.&&&&undefined.0&&&&&1&&&N.
os5.013&tf&0&Y&True or False? Additional memory can not do anything to help reduce or eliminate the effects of disk drag and its impact on overall system performance.&FALSE&TRUE&Additional memory can help reduce or eliminate the effects of disk drag and its impact on overall system performance&&&&undefined.0&&&&&1&&&N.
os5.014&tf&0&Y&True or False? One benefit of virtual memory is that when a large portion of the system is present in virtual memory, ongoing upgrades of main memory or expanded storage capacity improve the overall performance?&TRUE&FALSE&&&&&undefined.0&&&&&1&&&N.
os5.015&tf&0&Y&True or False? A subsystem makes the larger processing system operate slower and less efficiently.&FALSE&TRUE&The opposite is true, the subsystem makes the larger system operate more efficiently.&&&&undefined.0&&&&&1&&&N.
os5.016&mcs&0&Y&What is the opposite of batch processing?&Transaction processing&Automatic processing;Management processing;&&&&a&undefined.0&&&&&1:v&&&N.
os5.017&tf&0&N&True or False? <br><br>Hackers pose almost no threat to zSeries and s/390&TRUE&FALSE&&&&&undefined.0&&&&&1&&&N.
os5.018&mcs&0&N&What is the most secure server?&IBM z running z/OS&IBM i;UNIX-based servers;Intel machines running Windows Server OS;&IBM z running z/OS has the most sophisticated security features compared to other platforms.&&&a&undefined.0&&&&&1:v&&&N.
os5.019&mcs&0&Y&What is the most widely used security technique?&Passwords&Retina scanners;Tracking;&&&&a&undefined.0&&&&&1:v&&&N.
os5.020&esa&0&&The first step to secure a computing platform is to limit ____________ access from the outside world.&unauthorized&&The first step to secure a computing platform is to limit unauthorized access from the outside world.&&&&undefined.0&&&&&1&&&N.
os5.021&esa&0&&Distributed ______ further exposes assets to security risks.&data&&Distributed data further exposes assets to security risks.&&&&undefined.0&&&&&1&&&N.
os5.022&esa&0&&________ pose a greater treat to Windows and Unix-based systems, and pose almost no threat to a mainframe
;running z/OS.&hackers&&Hackers pose a greater treat to Windows and Unix-based systems, and pose almost no threat to a mainframe
;running z/OS.&&&&undefined.0&&&&&1&&&N.
os5.023&esa&0&&In the early days, Windows was hit by lots of __________ while Macs were less targeted. Consequently a myth
;emerged that Apple products do not get infected with them.&viruses&&In the early days, Windows was hit by lots of viruses while Macs were less targeted. Consequently a myth
;emerged that Apple products do not get viruses.&&&&undefined.0&&&&&1&&&N.
os5.024&esa&0&&Industrial espionage threatens all systems. Physical security and ____________ are necessary deterrents.&encryption&&Industrial espionage threatens all systems. Physical security and encryption are necessary deterrents.&&&&undefined.0&&&&&1&&&N.
os5.025&esa&0&&Employee theft of data are hardest to defend and here is where _______________ policies can play a big
;role.&administrative&&Employee theft of data are hardest to defend and here is where administrative policies can play a big role.&&&&undefined.0&&&&&1&&&N.
os5.026&esa&0&&z/OS and its predecessors have always been the most securable computer system environment because of the
;mainframe's integrated security design, advanced hardware, and supplemental security products available
;from Independent __________ Vendors (ISVs).&software&&z/OS and its predecessors have always been the most securable computer system environment because of the
;mainframe's integrated security design, advanced hardware, and supplemental security products available
;from Independent Software Vendors (ISVs).&&&&undefined.0&&&&&1&&&N.
os5.027&esa&0&&Each system's __________, operating systems, and supplemental security products have different
;capabilities.&hardware&&Each system's hardware, operating systems, and supplemental security products have different capabilities.&&&&undefined.0&&&&&1&&&N.
os5.028&esa&0&&A computer can be secured in two ways:<br><br>
;
;1. Restricting access by an unauthorized user<br><br>
;
;2. Limiting the damage that can be done by an executing _________&program&&A computer can be secured in two ways: 1)Restricting access by an unauthorized user. 2) Limiting the damage
;that can be done by an executing program.&&&&undefined.0&&&&&1&&&N.
os5.029&esa&0&&Damage by a person or a programs can be either ___________ or unintentional. Proper security will minimize
;the risk of either.&intentional&&Damage by a person or a programs can be either intentional or unintentional. Proper security will minimize
;the risk of either.&&&&undefined.0&&&&&1&&&N.
os5.030&esa&0&&The world of networked computing has greatly increased the difficulty of accurately identifying a user
;trying to access the system, as well as the_________ where logon attempts originate.&server&&The world of networked computing has greatly increased the difficulty of accurately identifying a user
;trying to access the system, as well as the server where logon attempts originate.&&&&undefined.0&&&&&1&&&N. os5.031&esa&0&&A virus is a program that is written to be destructive which hides or attaches itself to other _________.&programs&&A virus is a program that is written to be destructive which hides or attaches itself to other programs.&&&&undefined.0&&&&&1&&&N. os5.032&esa&0&&In a mainframe environment, viruses can neither attach themselves to other programs, nor destroy other ;programs and data. That's because the hardware protects privileged supervisory ____________ from access by ;rogue programs. Processors and memory can be isolated into logical partitions, and cryptographic processors ;are state of the art.&instructions&&In a mainframe environment, viruses can neither attach themselves to other programs, nor destroy other ;programs and data. That's because the hardware protects privileged supervisory instructions from access by ;rogue programs. Processors and memory can be isolated into logical partitions, and cryptographic processors ;are state of the art.&&&&undefined.0&&&&&1&&&N. os5.033&esa&0&&Regarding mixed workloads, z/OS virtualization isolates every program from each other and provides an ;Authorized Program Facility (APF) to limit which programs can enter _________ state. &supervisor&&Regarding mixed workloads, z/OS virtualization isolates every program from each other and provides an ;Authorized Program Facility (APF) to limit which programs can enter supervisor state. &&&&undefined.0&&&&&1&&&N. os5.034&esa&0&&In the rare instances where businesses using mainframes have had a security breach, the cause has been poor ;implementation and/or bad ____________ practices as opposed to technical vulnerabilities. &security&&In the rare instances where businesses using mainframes have had a security breach, the cause has been poor ;implementation and/or bad security practices as opposed to technical vulnerabilities. &&&&undefined.0&&&&&1&&&N. os5.035&esa&0&&A computer virus is just one of many types of ________.&malware&&A computer virus is just one of many types of malware.&&&&undefined.0&&&&&1&&&N. os5.036&esa&0&&Ransomeware is malware that __________ the victim's files and demands payment to restore them.&encrypts&&Ransomeware is malware that encrypts the victim's files and demands payment to restore them.&&&&undefined.0&&&&&1&&&N. os5.037&esa&0&&The bad guys who want to get their ;malicious software on your machine are often ;referred to as hackers, but  not ;all hackers are bad guys.  A hacker can be ;anybody who uses their ____________ of ;computer coding to bypass security ;measures on a computer, device, or network.&knowledge&&00:53 Malware video: The bad guys who want to get their malicious software on your machine are often ;referred to as hackers, but  not all hackers are bad guys.  A hacker can be anybody who uses their ;knowledge of computer coding to bypass security measures on a computer, device, or network.&&&&undefined.0&&&&&1&&&N. os5.038&esa&0&&If we didn't have white hat hackers seeking out threats and _________________ before the black hats can ;find them then there would probably be a lot more cybercrime than there is now.&vulnerabilities&&01:49 If we didn't have white hat hackers seeking out threats and vulnerabilities before the black hats can ;find them then there would probably be a lot more cybercrime than there is now.&&&&undefined.0&&&&&1&&&N. os5.039&esa&0&&Not all malware is destructive but it can cause very annoying behavior like ;generating a bunch of popup ads or it can cause your computer to run very ;slowly. These types of programs are not classified as malware. They're known as ;Potentially __________ Applications, or PUAs, which can come bundled in legitimate software programs as ;a package.&unwanted&&2:07 Not all malware is destructive but it can cause very annoying behavior like generating a bunch of ;popup ads or it can cause your computer to run very slowly. These types of programs are not classified as ;malware. They're known as Potentially Unwanted Applications, or PUAs, which can come bundled in legitimate ;software programs as a package.&&&&undefined.0&&&&&1&&&N. os5.040&esa&0&&___________ is designed to hide on your computer and monitor everywhere you log in and try to steal your ;username and password.&spyware&&03:27 Spyware  is designed to hide on your computer and monitor everywhere you log in and try to steal your ;username and password.&&&&undefined.0&&&&&1&&&N. os5.041&esa&0&N&A ________ can replicate itself without any human interaction and it does not need to attach itself to a ;program in order to cause damage. They can modify and delete files and even inject additional malware onto ;the computer&worm&&04:14 A worm can replicate itself without any human interaction and it does not need to attach itself to a ;<br>program in order to cause damage. They can modify and delete files and even inject additional malware ;onto <br>the computer.&&&&undefined.0&&&&&1&&&N. os5.042&esa&0&&One form of Trojan is a DDoS attack. DDoS stands for distributed _______ of service and it's designed to ;take down an entire network by flooding it with traffic.&denial&&05:55 One form of Trojan is a DDoS attack. DDoS stands for distributed denial of service and it's designed ;to take down an entire network by flooding it with traffic. &&&&undefined.0&&&&&1&&&N. os5.043&esa&0&&Exploit kits are malicious toolkits that attackers use to infect us while we're web browsing.  This is ;called a drive-by download that occurs when a user visits a malicious website that's hosting an exploit ;kit. There's no _____________ needed on the user's part other than visiting the infected web page. The ;exploit kit will look for the vulnerability in the software of the browser and inject malware via ;the security hole.&interaction&&08:47 Exploit kits are malicious toolkits that attackers use to infect us while we're web browsing.  This ;is called a drive-by download that occurs when a user visits a malicious website that's hosting an exploit ;kit. There's no interaction needed on the user's part other than visiting the infected web page. The ;exploit kit will look for the vulnerability in the software of the browser and inject malware via ;the security hole.&&&&undefined.0&&&&&1&&&N. os5.044&esa&0&&In 2016, the cyber criminal industry was costing the global economy approximately 300 ________ dollars a ;year these numbers alone prove how essential it is to have protection across all your devices as business ;is certainly booming in the malware world.&billion&&10:29 The cyber criminal industry costs the global economy approximately 300 billion dollars a year these ;numbers alone prove how essential it is to have protection across all your devices as business is certainly ;booming in the malware world.&&&&undefined.0&&&&&1&&&N. os5.045&esa&0&&The disaster recovery video stated that over 50% of businesses can only handle one ______ of downtime ;without significant financial damage - including potentially closing their doors.&hour&&00:38 The disaster recovery video stated that over 50% of businesses can only handle one hour of downtime ;without significant financial damage - including potentially closing their doors.&&&&undefined.0&&&&&1&&&N. os5.046&esa&0&&Among all available servers, the mainframe is by far the most securable platform, but security breaches are ;a combination of people, process, and __________. Even mainframe breaches can occur as a result of poor ;security admin policies & processes.&technology&&Among all available servers, the mainframe is by far the most securable platform, but security breaches are ;a combination of people, process, and technology. Even mainframe breaches can occur as a result of poor ;security admin (policies processes).&&&&undefined.0&&&&&1&&&N. os5.047&esa&0&&In z/OS, the function of the ________ Program Facility (APF) is to ensure that only pre-defined programs ;can do privileged activities.&authorized&&In z/OS, the function of the Authorized Program Facility (APF) is to ensure that only pre-defined programs ;can do privileged activities.&&&&undefined.0&&&&&1&&&N. os5.048&esa&0&&Websites that want to provide  customers with a safe secure shopping environment must purchase what's known ;as an SSL ____________ which is like having an online ID card that assure shoppers ;the website is indeed who it claims to be. ;&certificate&&00:40 SSL video: Websites that want to provide  customers with a safe secure shopping environment must ;purchase what's known as an SSL certificate which is like having an online ID card that assure ;shoppers<br>the website is indeed who it claims to be. This SSL certificate can be purchased from a web ;services company who is a certificate authority. &&&&undefined.0&&&&&1&&&N. os5.049&esa&0&&A ________ Based Access Control (RBAC) grants access privileges to a user based upon the work that user ;does within an organization. &role&&A ________ Based Access Control (RBAC) grants<br>access privileges to a user based upon the work that user ;does within an<br>organization. Here the administrator assigns a user to single or<br>multiple roles ;according to the user's work requirements.&&&&undefined.0&&&&&1&&&N. os5.050&esa&0&&Common Criteria is primarily intended to help buyers be assured that the process of specification, ;implementation and evaluation for any certified product was conducted in a thorough and standard manner so ;they can know the product they are purchasing has been independently verified to be “_______________” as ;measured against internationally agreed specifications.&trustworthy&&Common Criteria is primarily intended to help buyers be assured that the process of specification, ;implementation and evaluation for any certified product was conducted in a thorough and standard manner so ;they can know the product they are purchasing has been independently verified to be “trustworthy” as ;measured against internationally agreed specifications. (Common Criteria video 00:35)&&&&undefined.0&&&&&1&&&N. os5.051&esa&0&&Because insider security threats exists, organizations should have personnel share authorizations that ;force them to work together to accomplish a solution. This minimizes some of the risk because several ;people would need to ___________ to violate security.&conspire&&When a security threat exists, organizations should have personnel share authorizations that force them to ;work together to accomplish a solution. This minimizes some of the risk because several people would need ;to conspire to violate security.&&&&undefined.0&&&&&1&&&N. os5.052&esa&0&&Customers should create an _________ trail for tracking purposes. This simple principle is sometimes ;overlooked and people who are trying to circumvent security are not properly tracked and reported.&audit&&Customers should create an audit trail for tracking purposes. This simple principle is sometimes overlooked ;and people who are trying to circumvent security are not properly tracked and reported.&&&&undefined.0&&&&&1&&&N. os5.053&esa&0&N&The move toward two-factor authentication (2FA) and two-step verification (2SV) has improved logon ;security, but look for services to replace _____ messages as the second channel.&text&&The move toward two-factor authentication (2FA) and two-step verification (2SV) has improved logon ;<br>security, but look for services to replace SMS text messages as the second channel. By early 2020 ;<br>;standards organizations were recommending against using text messages in favor of biometrics &&&&undefined.0&&&&&1&&&N.