You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
54 lines
20 KiB
54 lines
20 KiB
id&qtp&qim&qil&qtx&qca&qia&qrm&qnxt&qprv&qalb&subj&wght&pts&flr&ded&layout&qfixed&qptsbyans&flags
|
|
os5.001&mcs&0&Y&Which one of the following best describes the purpose of an operating system?&Managing hardware and providing services to applications&Sorting large files;Managing on-line application development;Managing the tape library;&&&&a&undefined.0&&&&&1:v&&&N.
|
|
os5.002&mcs&0&Y&Which of the following IBM eServers use IRQs, I/O addresses, and DMAs as a way for the operating system to connect with the processor?&xSeries and Netfinity servers&iSeries and AS/400 servers;zSeries and S/390 servers;pSeries and RS/6000 platforms;&&&&a&undefined.0&&&&&1:v&&&N.
|
|
os5.003&mcs&0&Y&Which of the following is a false statement?&Virtual memory reduces main memory requirements per program by no more than 5 percent.&Very positive and practical results have been achieved with virtual memory environments because the 80/20 rule has proven to be reliable.;Virtual memory implementations help programmers.;&This statement is false because virtual memory reduces main storage by much more that 5 percent. &&&a&undefined.0&&&&&1:v&&&N.
|
|
os5.004&tf&0&Y&True or False? IBM eServer platforms are capable of handling concurrent transactions and providing sub-second response time, while running batch jobs to fill in any idle time.&TRUE&FALSE&&&&&undefined.0&&&&&1&&&N.
|
|
os5.005&mcs&0&N&Which one of the following did the material in this lesson suggest was a very popular and cost-effective
|
|
;security measure?&Passwords changed at regular intervals&Retina scanners;Card swipes;Security guards;&Passwords have always been a very popular and cost-effective security measure that can be supplemented with
|
|
;additional measures.&&&a&undefined.0&&&&&1:v&&&N.
|
|
os5.006&mcs&0&N&Your CIO says, "We have a lot of technology personnel who leave to pursue other opportunities. How can I be
|
|
;sure someone doesn't take some of our business files with them on their way out?" Click the best security
|
|
;rule to apply in this situation.&Restrict file access&Create an audit trail;Issue new user IDs once a month;Institute a multiple password system;&Restricting file access is a basic requirement for computer security. &&&a&undefined.0&&&&&1:v&&&N.
|
|
os5.007&mcs&0&Y&What kind of services does the operating system provide to coordinate shared resources and maintain the integrity of updated resources? &Serialization services&Timer services ;Locking services;Management services;&&&&a&undefined.0&&&&&1:v&&&N.
|
|
os5.008&tf&0&Y&True or False? The AIX kernel provides the ability to share resources simultaneously among many processes or threads and users.&TRUE&FALSE&&&&&undefined.0&&&&&1&&&N.
|
|
os5.009&tf&0&Y&True or False? A computer's operating system workload can not be prioritized using preemptive multitasking. &TRUE&FALSE&&&&&undefined.0&&&&&1&&&N.
|
|
os5.010&tf&0&Y&True or False? Virtual memory is used to optimize central storage.&TRUE&FALSE&&&&&undefined.0&&&&&1&&&N.
|
|
os5.011&mcs&0&Y&Virtual memory operating systems can keep only how much of a typical program in main memory and still meet service level objectives for the program.&20%&30%;50%;10%;&&&&a&undefined.0&&&&&1:v&&&N.
|
|
os5.012&tf&0&Y&True or False? One advantage of virtual memory is that it degrades the overall performance of the operating system. &FALSE&TRUE&The degrading of the overall performance of the operating system is a disadvantage.&&&&undefined.0&&&&&1&&&N.
|
|
os5.013&tf&0&Y&True or False? Additional memory can not do anything to help reduce or eliminate the effects of disk drag and its impact on overall system performance.&FALSE&TRUE&Additional memory can help reduce or eliminate the effects of disk drag and its impact on overall system performance&&&&undefined.0&&&&&1&&&N.
|
|
os5.014&tf&0&Y&True or False? One benefit of virtual memory is that when a large portion of the system is present in virtual memory, ongoing upgrades of main memory or expanded storage capacity improve the overall performance?&TRUE&FALSE&&&&&undefined.0&&&&&1&&&N.
|
|
os5.015&tf&0&Y&True or False? A subsystem makes the larger processing system operate slower and less efficiently.&FALSE&TRUE&The opposite is true, the subsystem makes the larger system operate more efficiently.&&&&undefined.0&&&&&1&&&N.
|
|
os5.016&mcs&0&Y&What is the opposite of batch processing?&Transaction processing&Automatic processing;Management processing;&&&&a&undefined.0&&&&&1:v&&&N.
|
|
os5.017&tf&0&N&True or False? <br><br>Hackers pose almost no threat to zSeries and s/390&TRUE&FALSE&&&&&undefined.0&&&&&1&&&N.
|
|
os5.018&mcs&0&N&What is the most secure server?&IBM z running z/OS&IBM i;UNIX-based servers;Intel machines running Windows Server OS;&IBM z running z/OS has the most sophisticated security features compared to other platforms.&&&a&undefined.0&&&&&1:v&&&N.
|
|
os5.019&mcs&0&Y&What is the most widely used security technique?&Passwords&Retina scanners;Tracking;&&&&a&undefined.0&&&&&1:v&&&N.
|
|
os5.020&esa&0&&The first step to secure a computing platform is to limit ____________ access from the outside world.&unauthorized&&The first step to secure a computing platform is to limit unauthorized access from the outside world.&&&&undefined.0&&&&&1&&&N.
|
|
os5.021&esa&0&&Distributed ______ further exposes assets to security risks.&data&&Distributed data further exposes assets to security risks.&&&&undefined.0&&&&&1&&&N.
|
|
os5.022&esa&0&&________ pose a greater treat to Windows and Unix-based systems, and pose almost no threat to a mainframe
|
|
;running z/OS.&hackers&&Hackers pose a greater treat to Windows and Unix-based systems, and pose almost no threat to a mainframe
|
|
;running z/OS.&&&&undefined.0&&&&&1&&&N.
|
|
os5.023&esa&0&&In the early days, Windows was hit by lots of __________ while Macs were less targeted. Consequently a myth
|
|
;emerged that Apple products do not get infected with them.&viruses&&In the early days, Windows was hit by lots of viruses while Macs were less targeted. Consequently a myth
|
|
;emerged that Apple products do not get viruses.&&&&undefined.0&&&&&1&&&N.
|
|
os5.024&esa&0&&Industrial espionage threatens all systems. Physical security and ____________ are necessary deterrents.&encryption&&Industrial espionage threatens all systems. Physical security and encryption are necessary deterrents.&&&&undefined.0&&&&&1&&&N.
|
|
os5.025&esa&0&&Employee theft of data are hardest to defend and here is where _______________ policies can play a big
|
|
;role.&administrative&&Employee theft of data are hardest to defend and here is where administrative policies can play a big role.&&&&undefined.0&&&&&1&&&N.
|
|
os5.026&esa&0&&z/OS and its predecessors have always been the most securable computer system environment because of the
|
|
;mainframe's integrated security design, advanced hardware, and supplemental security products available
|
|
;from Independent __________ Vendors (ISVs).&software&&z/OS and its predecessors have always been the most securable computer system environment because of the
|
|
;mainframe's integrated security design, advanced hardware, and supplemental security products available
|
|
;from Independent Software Vendors (ISVs).&&&&undefined.0&&&&&1&&&N.
|
|
os5.027&esa&0&&Each system's __________, operating systems, and supplemental security products have different
|
|
;capabilities.&hardware&&Each system's hardware, operating systems, and supplemental security products have different capabilities.&&&&undefined.0&&&&&1&&&N.
|
|
os5.028&esa&0&&A computer can be secured in two ways:<br><br>
|
|
;
|
|
;1. Restricting access by an unauthorized user<br><br>
|
|
;
|
|
;2. Limiting the damage that can be done by an executing _________&program&&A computer can be secured in two ways: 1)Restricting access by an unauthorized user. 2) Limiting the damage
|
|
;that can be done by an executing program.&&&&undefined.0&&&&&1&&&N.
|
|
os5.029&esa&0&&Damage by a person or a programs can be either ___________ or unintentional. Proper security will minimize
|
|
;the risk of either.&intentional&&Damage by a person or a programs can be either intentional or unintentional. Proper security will minimize
|
|
;the risk of either.&&&&undefined.0&&&&&1&&&N.
|
|
os5.030&esa&0&&The world of networked computing has greatly increased the difficulty of accurately identifying a user
|
|
;trying to access the system, as well as the_________ where logon attempts originate.&server&&The world of networked computing has greatly increased the difficulty of accurately identifying a user
|
|
;trying to access the system, as well as the server where logon attempts originate.&&&&undefined.0&&&&&1&&&N.
os5.031&esa&0&&A virus is a program that is written to be destructive which hides or attaches itself to other _________.&programs&&A virus is a program that is written to be destructive which hides or attaches itself to other programs.&&&&undefined.0&&&&&1&&&N.
os5.032&esa&0&&In a mainframe environment, viruses can neither attach themselves to other programs, nor destroy other
;programs and data. That's because the hardware protects privileged supervisory ____________ from access by
;rogue programs. Processors and memory can be isolated into logical partitions, and cryptographic processors
;are state of the art.&instructions&&In a mainframe environment, viruses can neither attach themselves to other programs, nor destroy other
;programs and data. That's because the hardware protects privileged supervisory instructions from access by
;rogue programs. Processors and memory can be isolated into logical partitions, and cryptographic processors
;are state of the art.&&&&undefined.0&&&&&1&&&N.
os5.033&esa&0&&Regarding mixed workloads, z/OS virtualization isolates every program from each other and provides an
;Authorized Program Facility (APF) to limit which programs can enter _________ state. &supervisor&&Regarding mixed workloads, z/OS virtualization isolates every program from each other and provides an
;Authorized Program Facility (APF) to limit which programs can enter supervisor state. &&&&undefined.0&&&&&1&&&N.
os5.034&esa&0&&In the rare instances where businesses using mainframes have had a security breach, the cause has been poor
;implementation and/or bad ____________ practices as opposed to technical vulnerabilities. &security&&In the rare instances where businesses using mainframes have had a security breach, the cause has been poor
;implementation and/or bad security practices as opposed to technical vulnerabilities. &&&&undefined.0&&&&&1&&&N.
os5.035&esa&0&&A computer virus is just one of many types of ________.&malware&&A computer virus is just one of many types of malware.&&&&undefined.0&&&&&1&&&N.
os5.036&esa&0&&Ransomeware is malware that __________ the victim's files and demands payment to restore them.&encrypts&&Ransomeware is malware that encrypts the victim's files and demands payment to restore them.&&&&undefined.0&&&&&1&&&N.
os5.037&esa&0&&The bad guys who want to get their
;malicious software on your machine are often
;referred to as hackers, but not
;all hackers are bad guys. A hacker can be
;anybody who uses their ____________ of
;computer coding to bypass security
;measures on a computer, device, or network.&knowledge&&00:53 Malware video: The bad guys who want to get their malicious software on your machine are often
;referred to as hackers, but not all hackers are bad guys. A hacker can be anybody who uses their
;knowledge of computer coding to bypass security measures on a computer, device, or network.&&&&undefined.0&&&&&1&&&N.
os5.038&esa&0&&If we didn't have white hat hackers seeking out threats and _________________ before the black hats can
;find them then there would probably be a lot more cybercrime than there is now.&vulnerabilities&&01:49 If we didn't have white hat hackers seeking out threats and vulnerabilities before the black hats can
;find them then there would probably be a lot more cybercrime than there is now.&&&&undefined.0&&&&&1&&&N.
os5.039&esa&0&&Not all malware is destructive but it can cause very annoying behavior like
;generating a bunch of popup ads or it can cause your computer to run very
;slowly. These types of programs are not classified as malware. They're known as
;Potentially __________ Applications, or PUAs, which can come bundled in legitimate software programs as
;a package.&unwanted&&2:07 Not all malware is destructive but it can cause very annoying behavior like generating a bunch of
;popup ads or it can cause your computer to run very slowly. These types of programs are not classified as
;malware. They're known as Potentially Unwanted Applications, or PUAs, which can come bundled in legitimate
;software programs as a package.&&&&undefined.0&&&&&1&&&N.
os5.040&esa&0&&___________ is designed to hide on your computer and monitor everywhere you log in and try to steal your
;username and password.&spyware&&03:27 Spyware is designed to hide on your computer and monitor everywhere you log in and try to steal your
;username and password.&&&&undefined.0&&&&&1&&&N.
os5.041&esa&0&N&A ________ can replicate itself without any human interaction and it does not need to attach itself to a
;program in order to cause damage. They can modify and delete files and even inject additional malware onto
;the computer&worm&&04:14 A worm can replicate itself without any human interaction and it does not need to attach itself to a
;<br>program in order to cause damage. They can modify and delete files and even inject additional malware
;onto <br>the computer.&&&&undefined.0&&&&&1&&&N.
os5.042&esa&0&&One form of Trojan is a DDoS attack. DDoS stands for distributed _______ of service and it's designed to
;take down an entire network by flooding it with traffic.&denial&&05:55 One form of Trojan is a DDoS attack. DDoS stands for distributed denial of service and it's designed
;to take down an entire network by flooding it with traffic. &&&&undefined.0&&&&&1&&&N.
os5.043&esa&0&&Exploit kits are malicious toolkits that attackers use to infect us while we're web browsing. This is
;called a drive-by download that occurs when a user visits a malicious website that's hosting an exploit
;kit. There's no _____________ needed on the user's part other than visiting the infected web page. The
;exploit kit will look for the vulnerability in the software of the browser and inject malware via
;the security hole.&interaction&&08:47 Exploit kits are malicious toolkits that attackers use to infect us while we're web browsing. This
;is called a drive-by download that occurs when a user visits a malicious website that's hosting an exploit
;kit. There's no interaction needed on the user's part other than visiting the infected web page. The
;exploit kit will look for the vulnerability in the software of the browser and inject malware via
;the security hole.&&&&undefined.0&&&&&1&&&N.
os5.044&esa&0&&In 2016, the cyber criminal industry was costing the global economy approximately 300 ________ dollars a
;year these numbers alone prove how essential it is to have protection across all your devices as business
;is certainly booming in the malware world.&billion&&10:29 The cyber criminal industry costs the global economy approximately 300 billion dollars a year these
;numbers alone prove how essential it is to have protection across all your devices as business is certainly
;booming in the malware world.&&&&undefined.0&&&&&1&&&N.
os5.045&esa&0&&The disaster recovery video stated that over 50% of businesses can only handle one ______ of downtime
;without significant financial damage - including potentially closing their doors.&hour&&00:38 The disaster recovery video stated that over 50% of businesses can only handle one hour of downtime
;without significant financial damage - including potentially closing their doors.&&&&undefined.0&&&&&1&&&N.
os5.046&esa&0&&Among all available servers, the mainframe is by far the most securable platform, but security breaches are
;a combination of people, process, and __________. Even mainframe breaches can occur as a result of poor
;security admin policies & processes.&technology&&Among all available servers, the mainframe is by far the most securable platform, but security breaches are
;a combination of people, process, and technology. Even mainframe breaches can occur as a result of poor
;security admin (policies processes).&&&&undefined.0&&&&&1&&&N.
os5.047&esa&0&&In z/OS, the function of the ________ Program Facility (APF) is to ensure that only pre-defined programs
;can do privileged activities.&authorized&&In z/OS, the function of the Authorized Program Facility (APF) is to ensure that only pre-defined programs
;can do privileged activities.&&&&undefined.0&&&&&1&&&N.
os5.048&esa&0&&Websites that want to provide customers with a safe secure shopping environment must purchase what's known
;as an SSL ____________ which is like having an online ID card that assure shoppers
;the website is indeed who it claims to be.
;&certificate&&00:40 SSL video: Websites that want to provide customers with a safe secure shopping environment must
;purchase what's known as an SSL certificate which is like having an online ID card that assure
;shoppers<br>the website is indeed who it claims to be. This SSL certificate can be purchased from a web
;services company who is a certificate authority. &&&&undefined.0&&&&&1&&&N.
os5.049&esa&0&&A ________ Based Access Control (RBAC) grants access privileges to a user based upon the work that user
;does within an organization. &role&&A ________ Based Access Control (RBAC) grants<br>access privileges to a user based upon the work that user
;does within an<br>organization. Here the administrator assigns a user to single or<br>multiple roles
;according to the user's work requirements.&&&&undefined.0&&&&&1&&&N.
os5.050&esa&0&&Common Criteria is primarily intended to help buyers be assured that the process of specification,
;implementation and evaluation for any certified product was conducted in a thorough and standard manner so
;they can know the product they are purchasing has been independently verified to be “_______________” as
;measured against internationally agreed specifications.&trustworthy&&Common Criteria is primarily intended to help buyers be assured that the process of specification,
;implementation and evaluation for any certified product was conducted in a thorough and standard manner so
;they can know the product they are purchasing has been independently verified to be “trustworthy” as
;measured against internationally agreed specifications. (Common Criteria video 00:35)&&&&undefined.0&&&&&1&&&N.
os5.051&esa&0&&Because insider security threats exists, organizations should have personnel share authorizations that
;force them to work together to accomplish a solution. This minimizes some of the risk because several
;people would need to ___________ to violate security.&conspire&&When a security threat exists, organizations should have personnel share authorizations that force them to
;work together to accomplish a solution. This minimizes some of the risk because several people would need
;to conspire to violate security.&&&&undefined.0&&&&&1&&&N.
os5.052&esa&0&&Customers should create an _________ trail for tracking purposes. This simple principle is sometimes
;overlooked and people who are trying to circumvent security are not properly tracked and reported.&audit&&Customers should create an audit trail for tracking purposes. This simple principle is sometimes overlooked
;and people who are trying to circumvent security are not properly tracked and reported.&&&&undefined.0&&&&&1&&&N.
os5.053&esa&0&N&The move toward two-factor authentication (2FA) and two-step verification (2SV) has improved logon
;security, but look for services to replace _____ messages as the second channel.&text&&The move toward two-factor authentication (2FA) and two-step verification (2SV) has improved logon
;<br>security, but look for services to replace SMS text messages as the second channel. By early 2020
;<br>;standards organizations were recommending against using text messages in favor of biometrics &&&&undefined.0&&&&&1&&&N.
|
|
|