Files
survey-manager/survey-nginx/secure_html/data/tests/os5.testcentral
2024-07-19 10:05:36 +00:00

55 lines
20 KiB
Plaintext
Executable File
Raw Blame History

This file contains invisible Unicode characters
This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.
id&qtp&qim&qil&qtx&qca&qia&qrm&qnxt&qprv&qalb&subj&wght&pts&flr&ded&layout&qfixed&qptsbyans&flags
os5.001&mcs&0&Y&Which one of the following best describes the purpose of an operating system?&Managing hardware and providing services to applications&Sorting large files;Managing on-line application development;Managing the tape library;&&&&a&undefined.0&&&&&1:v&&&N.
os5.002&mcs&0&Y&Which of the following IBM eServers use IRQs, I/O addresses, and DMAs as a way for the operating system to connect with the processor?&xSeries and Netfinity servers&iSeries and AS/400 servers;zSeries and S/390 servers;pSeries and RS/6000 platforms;&&&&a&undefined.0&&&&&1:v&&&N.
os5.003&mcs&0&Y&Which of the following is a false statement?&Virtual memory reduces main memory requirements per program by no more than 5 percent.&Very positive and practical results have been achieved with virtual memory environments because the 80/20 rule has proven to be reliable.;Virtual memory implementations help programmers.;&This statement is false because virtual memory reduces main storage by much more that 5 percent. &&&a&undefined.0&&&&&1:v&&&N.
os5.004&tf&0&Y&True or False? IBM eServer platforms are capable of handling concurrent transactions and providing sub-second response time, while running batch jobs to fill in any idle time.&TRUE&FALSE&&&&&undefined.0&&&&&1&&&N.
os5.005&mcs&0&N&Which one of the following did the material in this lesson suggest was a very popular and cost-effective
;security measure?&Passwords changed at regular intervals&Retina scanners;Card swipes;Security guards;&Passwords have always been a very popular and cost-effective security measure that can be supplemented with
;additional measures.&&&a&undefined.0&&&&&1:v&&&N.
os5.006&mcs&0&N&Your CIO says, "We have a lot of technology personnel who leave to pursue other opportunities. How can I be
;sure someone doesn't take some of our business files with them on their way out?" Click the best security
;rule to apply in this situation.&Restrict file access&Create an audit trail;Issue new user IDs once a month;Institute a multiple password system;&Restricting file access is a basic requirement for computer security. &&&a&undefined.0&&&&&1:v&&&N.
os5.007&mcs&0&Y&What kind of services does the operating system provide to coordinate shared resources and maintain the integrity of updated resources? &Serialization services&Timer services ;Locking services;Management services;&&&&a&undefined.0&&&&&1:v&&&N.
os5.008&tf&0&Y&True or False? The AIX kernel provides the ability to share resources simultaneously among many processes or threads and users.&TRUE&FALSE&&&&&undefined.0&&&&&1&&&N.
os5.009&tf&0&Y&True or False? A computer's operating system workload can not be prioritized using preemptive multitasking. &TRUE&FALSE&&&&&undefined.0&&&&&1&&&N.
os5.010&tf&0&Y&True or False? Virtual memory is used to optimize central storage.&TRUE&FALSE&&&&&undefined.0&&&&&1&&&N.
os5.011&mcs&0&Y&Virtual memory operating systems can keep only how much of a typical program in main memory and still meet service level objectives for the program.&20%&30%;50%;10%;&&&&a&undefined.0&&&&&1:v&&&N.
os5.012&tf&0&Y&True or False? One advantage of virtual memory is that it degrades the overall performance of the operating system. &FALSE&TRUE&The degrading of the overall performance of the operating system is a disadvantage.&&&&undefined.0&&&&&1&&&N.
os5.013&tf&0&Y&True or False? Additional memory can not do anything to help reduce or eliminate the effects of disk drag and its impact on overall system performance.&FALSE&TRUE&Additional memory can help reduce or eliminate the effects of disk drag and its impact on overall system performance&&&&undefined.0&&&&&1&&&N.
os5.014&tf&0&Y&True or False? One benefit of virtual memory is that when a large portion of the system is present in virtual memory, ongoing upgrades of main memory or expanded storage capacity improve the overall performance?&TRUE&FALSE&&&&&undefined.0&&&&&1&&&N.
os5.015&tf&0&Y&True or False? A subsystem makes the larger processing system operate slower and less efficiently.&FALSE&TRUE&The opposite is true, the subsystem makes the larger system operate more efficiently.&&&&undefined.0&&&&&1&&&N.
os5.016&mcs&0&Y&What is the opposite of batch processing?&Transaction processing&Automatic processing;Management processing;&&&&a&undefined.0&&&&&1:v&&&N.
os5.017&tf&0&N&True or False? <br><br>Hackers pose almost no threat to zSeries and s/390&TRUE&FALSE&&&&&undefined.0&&&&&1&&&N.
os5.018&mcs&0&N&What is the most secure server?&IBM z running z/OS&IBM i;UNIX-based servers;Intel machines running Windows Server OS;&IBM z running z/OS has the most sophisticated security features compared to other platforms.&&&a&undefined.0&&&&&1:v&&&N.
os5.019&mcs&0&Y&What is the most widely used security technique?&Passwords&Retina scanners;Tracking;&&&&a&undefined.0&&&&&1:v&&&N.
os5.020&esa&0&&The first step to secure a computing platform is to limit ____________ access from the outside world.&unauthorized&&The first step to secure a computing platform is to limit unauthorized access from the outside world.&&&&undefined.0&&&&&1&&&N.
os5.021&esa&0&&Distributed ______ further exposes assets to security risks.&data&&Distributed data further exposes assets to security risks.&&&&undefined.0&&&&&1&&&N.
os5.022&esa&0&&________ pose a greater treat to Windows and Unix-based systems, and pose almost no threat to a mainframe
;running z/OS.&hackers&&Hackers pose a greater treat to Windows and Unix-based systems, and pose almost no threat to a mainframe
;running z/OS.&&&&undefined.0&&&&&1&&&N.
os5.023&esa&0&&In the early days, Windows was hit by lots of __________ while Macs were less targeted. Consequently a myth
;emerged that Apple products do not get infected with them.&viruses&&In the early days, Windows was hit by lots of viruses while Macs were less targeted. Consequently a myth
;emerged that Apple products do not get viruses.&&&&undefined.0&&&&&1&&&N.
os5.024&esa&0&&Industrial espionage threatens all systems. Physical security and ____________ are necessary deterrents.&encryption&&Industrial espionage threatens all systems. Physical security and encryption are necessary deterrents.&&&&undefined.0&&&&&1&&&N.
os5.025&esa&0&&Employee theft of data are hardest to defend and here is where _______________ policies can play a big
;role.&administrative&&Employee theft of data are hardest to defend and here is where administrative policies can play a big role.&&&&undefined.0&&&&&1&&&N.
os5.026&esa&0&&z/OS and its predecessors have always been the most securable computer system environment because of the
;mainframe's integrated security design, advanced hardware, and supplemental security products available
;from Independent __________ Vendors (ISVs).&software&&z/OS and its predecessors have always been the most securable computer system environment because of the
;mainframe's integrated security design, advanced hardware, and supplemental security products available
;from Independent Software Vendors (ISVs).&&&&undefined.0&&&&&1&&&N.
os5.027&esa&0&&Each system's __________, operating systems, and supplemental security products have different
;capabilities.&hardware&&Each system's hardware, operating systems, and supplemental security products have different capabilities.&&&&undefined.0&&&&&1&&&N.
os5.028&esa&0&&A computer can be secured in two ways:<br><br>
;
;1. Restricting access by an unauthorized user<br><br>
;
;2. Limiting the damage that can be done by an executing _________&program&&A computer can be secured in two ways: 1)Restricting access by an unauthorized user. 2) Limiting the damage
;that can be done by an executing program.&&&&undefined.0&&&&&1&&&N.
os5.029&esa&0&&Damage by a person or a programs can be either ___________ or unintentional. Proper security will minimize
;the risk of either.&intentional&&Damage by a person or a programs can be either intentional or unintentional. Proper security will minimize
;the risk of either.&&&&undefined.0&&&&&1&&&N.
os5.030&esa&0&&The world of networked computing has greatly increased the difficulty of accurately identifying a user
;trying to access the system, as well as the_________ where logon attempts originate.&server&&The world of networked computing has greatly increased the difficulty of accurately identifying a user
;trying to access the system, as well as the server where logon attempts originate.&&&&undefined.0&&&&&1&&&N.
os5.031&esa&0&&A virus is a program that is written to be destructive which hides or attaches itself to other _________.&programs&&A virus is a program that is written to be destructive which hides or attaches itself to other programs.&&&&undefined.0&&&&&1&&&N.
os5.032&esa&0&&In a mainframe environment, viruses can neither attach themselves to other programs, nor destroy other
;programs and data. That's because the hardware protects privileged supervisory ____________ from access by
;rogue programs. Processors and memory can be isolated into logical partitions, and cryptographic processors
;are state of the art.&instructions&&In a mainframe environment, viruses can neither attach themselves to other programs, nor destroy other
;programs and data. That's because the hardware protects privileged supervisory instructions from access by
;rogue programs. Processors and memory can be isolated into logical partitions, and cryptographic processors
;are state of the art.&&&&undefined.0&&&&&1&&&N.
os5.033&esa&0&&Regarding mixed workloads, z/OS virtualization isolates every program from each other and provides an
;Authorized Program Facility (APF) to limit which programs can enter _________ state. &supervisor&&Regarding mixed workloads, z/OS virtualization isolates every program from each other and provides an
;Authorized Program Facility (APF) to limit which programs can enter supervisor state. &&&&undefined.0&&&&&1&&&N.
os5.034&esa&0&&In the rare instances where businesses using mainframes have had a security breach, the cause has been poor
;implementation and/or bad ____________ practices as opposed to technical vulnerabilities. &security&&In the rare instances where businesses using mainframes have had a security breach, the cause has been poor
;implementation and/or bad security practices as opposed to technical vulnerabilities. &&&&undefined.0&&&&&1&&&N.
os5.035&esa&0&&A computer virus is just one of many types of ________.&malware&&A computer virus is just one of many types of malware.&&&&undefined.0&&&&&1&&&N.
os5.036&esa&0&&Ransomeware is malware that __________ the victim's files and demands payment to restore them.&encrypts&&Ransomeware is malware that encrypts the victim's files and demands payment to restore them.&&&&undefined.0&&&&&1&&&N.
os5.037&esa&0&&The bad guys who want to get their
;malicious software on your machine are often
;referred to as hackers, but  not
;all hackers are bad guys.  A hacker can be
;anybody who uses their ____________ of
;computer coding to bypass security
;measures on a computer, device, or network.&knowledge&&00:53 Malware video: The bad guys who want to get their malicious software on your machine are often
;referred to as hackers, but  not all hackers are bad guys.  A hacker can be anybody who uses their
;knowledge of computer coding to bypass security measures on a computer, device, or network.&&&&undefined.0&&&&&1&&&N.
os5.038&esa&0&&If we didn't have white hat hackers seeking out threats and _________________ before the black hats can
;find them then there would probably be a lot more cybercrime than there is now.&vulnerabilities&&01:49 If we didn't have white hat hackers seeking out threats and vulnerabilities before the black hats can
;find them then there would probably be a lot more cybercrime than there is now.&&&&undefined.0&&&&&1&&&N.
os5.039&esa&0&&Not all malware is destructive but it can cause very annoying behavior like
;generating a bunch of popup ads or it can cause your computer to run very
;slowly. These types of programs are not classified as malware. They're known as
;Potentially __________ Applications, or PUAs, which can come bundled in legitimate software programs as
;a package.&unwanted&&2:07 Not all malware is destructive but it can cause very annoying behavior like generating a bunch of
;popup ads or it can cause your computer to run very slowly. These types of programs are not classified as
;malware. They're known as Potentially Unwanted Applications, or PUAs, which can come bundled in legitimate
;software programs as a package.&&&&undefined.0&&&&&1&&&N.
os5.040&esa&0&&___________ is designed to hide on your computer and monitor everywhere you log in and try to steal your
;username and password.&spyware&&03:27 Spyware  is designed to hide on your computer and monitor everywhere you log in and try to steal your
;username and password.&&&&undefined.0&&&&&1&&&N.
os5.041&esa&0&N&A ________ can replicate itself without any human interaction and it does not need to attach itself to a
;program in order to cause damage. They can modify and delete files and even inject additional malware onto
;the computer&worm&&04:14 A worm can replicate itself without any human interaction and it does not need to attach itself to a
;<br>program in order to cause damage. They can modify and delete files and even inject additional malware
;onto <br>the computer.&&&&undefined.0&&&&&1&&&N.
os5.042&esa&0&&One form of Trojan is a DDoS attack. DDoS stands for distributed _______ of service and it's designed to
;take down an entire network by flooding it with traffic.&denial&&05:55 One form of Trojan is a DDoS attack. DDoS stands for distributed denial of service and it's designed
;to take down an entire network by flooding it with traffic. &&&&undefined.0&&&&&1&&&N.
os5.043&esa&0&&Exploit kits are malicious toolkits that attackers use to infect us while we're web browsing.  This is
;called a drive-by download that occurs when a user visits a malicious website that's hosting an exploit
;kit. There's no _____________ needed on the user's part other than visiting the infected web page. The
;exploit kit will look for the vulnerability in the software of the browser and inject malware via
;the security hole.&interaction&&08:47 Exploit kits are malicious toolkits that attackers use to infect us while we're web browsing.  This
;is called a drive-by download that occurs when a user visits a malicious website that's hosting an exploit
;kit. There's no interaction needed on the user's part other than visiting the infected web page. The
;exploit kit will look for the vulnerability in the software of the browser and inject malware via
;the security hole.&&&&undefined.0&&&&&1&&&N.
os5.044&esa&0&&In 2016, the cyber criminal industry was costing the global economy approximately 300 ________ dollars a
;year these numbers alone prove how essential it is to have protection across all your devices as business
;is certainly booming in the malware world.&billion&&10:29 The cyber criminal industry costs the global economy approximately 300 billion dollars a year these
;numbers alone prove how essential it is to have protection across all your devices as business is certainly
;booming in the malware world.&&&&undefined.0&&&&&1&&&N.
os5.045&esa&0&&The disaster recovery video stated that over 50% of businesses can only handle one ______ of downtime
;without significant financial damage - including potentially closing their doors.&hour&&00:38 The disaster recovery video stated that over 50% of businesses can only handle one hour of downtime
;without significant financial damage - including potentially closing their doors.&&&&undefined.0&&&&&1&&&N.
os5.046&esa&0&&Among all available servers, the mainframe is by far the most securable platform, but security breaches are
;a combination of people, process, and __________. Even mainframe breaches can occur as a result of poor
;security admin policies & processes.&technology&&Among all available servers, the mainframe is by far the most securable platform, but security breaches are
;a combination of people, process, and technology. Even mainframe breaches can occur as a result of poor
;security admin (policies processes).&&&&undefined.0&&&&&1&&&N.
os5.047&esa&0&&In z/OS, the function of the ________ Program Facility (APF) is to ensure that only pre-defined programs
;can do privileged activities.&authorized&&In z/OS, the function of the Authorized Program Facility (APF) is to ensure that only pre-defined programs
;can do privileged activities.&&&&undefined.0&&&&&1&&&N.
os5.048&esa&0&&Websites that want to provide  customers with a safe secure shopping environment must purchase what's known
;as an SSL ____________ which is like having an online ID card that assure shoppers
;the website is indeed who it claims to be.
;&certificate&&00:40 SSL video: Websites that want to provide  customers with a safe secure shopping environment must
;purchase what's known as an SSL certificate which is like having an online ID card that assure
;shoppers<br>the website is indeed who it claims to be. This SSL certificate can be purchased from a web
;services company who is a certificate authority. &&&&undefined.0&&&&&1&&&N.
os5.049&esa&0&&A ________ Based Access Control (RBAC) grants access privileges to a user based upon the work that user
;does within an organization. &role&&A ________ Based Access Control (RBAC) grants<br>access privileges to a user based upon the work that user
;does within an<br>organization. Here the administrator assigns a user to single or<br>multiple roles
;according to the user's work requirements.&&&&undefined.0&&&&&1&&&N.
os5.050&esa&0&&Common Criteria is primarily intended to help buyers be assured that the process of specification,
;implementation and evaluation for any certified product was conducted in a thorough and standard manner so
;they can know the product they are purchasing has been independently verified to be “_______________” as
;measured against internationally agreed specifications.&trustworthy&&Common Criteria is primarily intended to help buyers be assured that the process of specification,
;implementation and evaluation for any certified product was conducted in a thorough and standard manner so
;they can know the product they are purchasing has been independently verified to be “trustworthy” as
;measured against internationally agreed specifications. (Common Criteria video 00:35)&&&&undefined.0&&&&&1&&&N.
os5.051&esa&0&&Because insider security threats exists, organizations should have personnel share authorizations that
;force them to work together to accomplish a solution. This minimizes some of the risk because several
;people would need to ___________ to violate security.&conspire&&When a security threat exists, organizations should have personnel share authorizations that force them to
;work together to accomplish a solution. This minimizes some of the risk because several people would need
;to conspire to violate security.&&&&undefined.0&&&&&1&&&N.
os5.052&esa&0&&Customers should create an _________ trail for tracking purposes. This simple principle is sometimes
;overlooked and people who are trying to circumvent security are not properly tracked and reported.&audit&&Customers should create an audit trail for tracking purposes. This simple principle is sometimes overlooked
;and people who are trying to circumvent security are not properly tracked and reported.&&&&undefined.0&&&&&1&&&N.
os5.053&esa&0&N&The move toward two-factor authentication (2FA) and two-step verification (2SV) has improved logon
;security, but look for services to replace _____ messages as the second channel.&text&&The move toward two-factor authentication (2FA) and two-step verification (2SV) has improved logon
;<br>security, but look for services to replace SMS text messages as the second channel. By early 2020
;<br>;standards organizations were recommending against using text messages in favor of biometrics &&&&undefined.0&&&&&1&&&N.