ooo AT&T; 10:10 AM claflin learninghouse.com NSWI 1) With process has complete c
ID: 3820371 • Letter: O
Question
ooo AT&T; 10:10 AM claflin learninghouse.com NSWI 1) With process has complete control of the system and can add change programs and files, monitor other processes, send and receive network traffic, and alter privileges. 2)A key security issue in the design of any is to prevent, or at least detect attempts by a user or a piece of malicious software from gaining unauthorized privileges on 3) System access threats fall into two general categories: intruders and 4) The three classes of intruders are clandestine user, mis feasor, and 5) Intrusion detection systems can be classified as host-based is the process of retaining copies of data over extended periods of time in order to meet legal and operational requirements to access past data. is the process of ing copies of data at regular intervals, allowing the recovery of or over relatively short time periods. 8)System security begins with the installation of the 9) controls access based on the roles that users have within the system and on rules stating what accesses are allowed to users in given roles. controls access based on the identity ofthe requestor and on access rules stating what requestors are or are not allowed to do. defenses aim to detect and abort attacks in executing programs. condition at an interface under which more input can be placed into a buffer or data-holding area than the capacity allocated, overwriting other information. 13) The design goals for a are: acts as a choke point, enforces the local security policy, is secure against attacks. 4) Electronic keycards, smart cards, and physical keys are authenticators that are referred lo as a 15) An IDS comprises three logical components: sensors, user interface, and 10%Explanation / Answer
1) With root access, a process has complete control of the system and can add or change programs and files, monitor other processes, send and receive network traffic, and alter privileges.
2) A key security issue in the design of any Operating System is to prevent, or at least detect, attempts by a user or a piece of malicious software from gaining unauthorized privileges on the system.
3) System access threats fall into two general categories:
Intruders and malicious software.
4) The three classes of intruders are clandestine user, misfeasor and Masquerader.
5) Intrusion detection systems can be classified as host-based or network-based.
6) Archive is the process of retaining copies of data over extended periods of time, being months or years, in order to meet legal and operational requirements to access past data.
7) Backup is the process of making copies of data at regular intervals allowing the recovery of lost or corrupted data over relatively short time periods of a few hours to some weeks.
8) System security begins with the installation of the Operating System.
9) Role Based Access Control controls access based on the roles that users have within the system and on rules stating what accesses are allowed to users in given roles.
10) Discretionary Access Control controls access based on the identity of the requestor and on access rules (authorizations) stating what requestors are (or are not) allowed to do.
11) Runtime defenses aim to detect and abort attacks in executing programs.
12) Buffer Overflow is a condition at an interface under which more input can be placed into a buffer or data-holding area than the capacity allocated, overwriting other information.
13) The design goals for a Firewall are: acts as a choke point, enforces the local security policy, is secure against attacks.
14) Electronic keycards, smart cards, and physical keys are authenticators that are referred to as a token.
15) An IDS comprises three logical components: sensors, Analyzers and user interface.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
1) Main memory is divided into a number of static partitions at system generation time : Fixed Partitioning
Option A
2) Main memory is divided into a number of equal-size frames is the Simple Paging technique.
Option A
3) With Simple paging Segmentation a process is loaded by loading all of its segments into dynamic partitions that need not be contiguous.
Option A
4) One technique for overcoming external fragmentation is Compaction.
Option B
5) A Relative Address is a particular example of logical address in which the address is expressed as a location relative to some known point, usually a value in a processor register.
Option B
6) The chunks of a process are known as Pages.
Option A
7) Available chunks of memory are known as Frames.
Option A
8) The concept of Memory Management satisfies certain system requirements including: Physical Organization
Option C
9) In the Dynamic Partitioning technique of memory management, the placement algorithm that chooses the block that is closest in size to the request is called Best Fit.
Option B
10) In the Dynamic Partitioning technique of memory management, the placement algorithm that scans memory from the location of the last placement and chooses the next available block that is large enough to satisfy the request is called Next Fit.
Option C
11) A problem with the largely obsolete Fixed Partitioning memory management technique is: Internal Fragmentation
Option C
12) The page table for each process maintains the Frame Location for Each Page of the Process.
Option B
13) In a system employing a segmentation scheme for memory management wasted space is due to External Fragmentation.
Option A
14) In a system employing a paging scheme for memory management wasted space is due to Internal Fragmentation.
Option A
15) In a system employing a segmentation scheme for memory management a process is divided into a number of segments which need not be of equal size.
Option C
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
1) The task of subdividing memory to accommodate multiple processes is carried out dynamically by the operating system and is known as Memory Management.
2) A Segment is a variable length block of data that resides in secondary memory.
3) In a practice known as Overlaying, the program and data are organized in such a way that various modules can be assigned the same region of memory with a main program responsible for switching the modules in and out as needed.
4) A Physical Address is an actual location in main memory.
5) A fixed length block of data that resides in secondary memory is a page.
6) When there is wasted space internal to a partition due to the fact that the block of data loaded is smaller than the partition is referred to as Internal Fragmentation.
7) Main Memory in a computer system is organized as a linear, or one-dimensional, address space, consisting of a sequence of bytes or words.
8) A Frame is a fixed length block of main memory.
9) As time goes on, memory becomes more and more fragmented and memory utilization declines, creating a phenomenon referred to as External Fragmentation.
10) A compromise to overcome the disadvantages of fixed partitioning and dynamic partitioning is the Buddy System.
11) A Logical Address is a reference to a memory location independent of the current assignment of data to memory.
12) The Page Table shows the frame location for each page of the process.
13) A Buffer Overflow can occur as a result of a programming error when a process attempts to store data beyond the limits of a fixed-sized buffer and consequently overwrites adjacent memory locations.
14) Countermeasures to defend systems against attacks can be classified into two categories: compile-time defenses and Run-Time Defenses.
15) The basic tools of memory management are paging and Segmentation.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.