Computers and Technology
Computers and Technology, 29.12.2020 15:20, manou76

Hi, I need to answer the following questions related to cryptography, Linux and UNIX 1. Does it specify what user protection entails?
a. Use of certification methods;
b. Starting a pseudo-device;
c. Raising a proxy server;
d. Activation of daemons;
e. Using the 9 rwx bits;
f. Activating openssl;
2. Specify what is the basic application of libressl?
a. Formation of a security substrate;
b. Message encryption;
c. Data certification;
d. Securing the browser while browsing the Internet;
3. Does it mean building security at OSI levels in the first place?
a. Starting an antivirus;
b. Formation of certification methods;
c. Installation of encryption applications;
d. Securing entity tables;
4. What does the enable option do?
a. Starts the service and activates it in the crontab;
b. Start the service at the current boot;
c. Temporarily starts the service and then shuts it down;
d. Starts the boot service;
5. Specify which instruction starts a device?
a. block;
b. write;
c. sleep;
d. wait;
e. kill;
f. seek;
g. fork;
h. detach;
i. modify;
j. notify;
k. nice;
l. exec;
m. add;
n. read;
o. exit;
p. delete;
q. close;
r. open;
s. attach;

6. Where are hybrid kernel modules stored?
a. In the address space of the kernel;
b. In the user's address space;
c. In the processor segmentation registers;
d. In the processor paging registers;
7. What statement is used in openbsd to view all services?
a. /etc/rc. d/* status;
b. service -status-all;
c. systemctl | grep status;
d. /etc/init. d/* status;
e. and service --service-all;
f. systemctl list-unit-files --type service -all;
g. rcctl --status-all;
8. How do exokernels differ?
a. Through libraries segregated by namespaces;
b. Through constructive simplicity;
c. By extended user privileges,
d. Through layers and CPIs;
e. By the size of the source code;
f. Through increased security;
g. By components and their location;
9. Is the highest security class A2?
a. FALSE
b. TRUE
10. Are the binaries used mainly by the root located in the / bin and / usr / bin directories?
a. FALSE
b. TRUE
11. Which operating system has security tags?
a. А1;
b. B1;
c. С2;
d. B3;
e. B2;
f. A2;
12. What partition is missing when installing the operating system under BIOS?
a. zfs;
b. ufs;
c. fat;
d. ext4;
e. esp:
f. swap;

13. Can't the physical link create a link to the directories?
a. FALSE
b. TRUE
14. What will the file extension have: "dd if = file. xxx of = devicename bs = 4M"?
a. exe;
b. img;
c. tar;
d. iso;
15. What action is not part of the rcd service manager?
a. disable;
b. run;
c. check;
d. reload;
e. stop;
f. enable;
16. What does the enable option do?
a. Temporarily starts the service and then shuts it down;
b. Start the service at the current boot;
c. Starts the boot service;
d. Starts the service and activates it in the crontab;
17. Specifies the correct method for the file to have the following rights: r - r-x-w-?
a. 742;
b. 463;
c. 452;
d. 215;
e. 136;
18. Specifies the correct method for the file to have the following rights: r-x-wx-w-?
a. 324;
b. 143;
c. 471;
d. 721;
e. 532;
19. Does it specify what process protection entails?
a. Use of certification methods;
b. Activating daemons,
c. Starting a pseudo-device;
d. Setting up a proxy server:
e. Using the 9 bits rwх;
f. Activating openssl;

20. Does it mean building security at OSI levels in the first place?
a. Starting an antivirus;
b. Formation of certification methods;
c. Installation of encryption applications;
d. Securing entity tables;
21. In which hierarchy are the user applications additionally installed placed?
a. 3;
b. 5;
c. 1;
d. 4;
e. 2;
22. Which file system has a tabular checksum?
a. ext3;
b. UFS;
c. NTFS;
d. JFS;
e. BtrFS;
f. ext4;
g. XFS;
h. ZFS;
i. ext2;
23. Specify which statement will stop a user's activity?
a. fork;
b. sleep;
c. block;
d. exec;
e. detach;
f. Notify;
g. add;
h. seek:
i. kill;
j. modify;
k. wait;
l. nice;
m. open;
n. attach;
o. delete;
p. kill;
q. exec;
r. notify;
s. add;

24. Specify which statement changes the priority of a process?
a. seek;
b. detach;
c. nice;
d. modify;
e. sleep;
f. delete;
g. exit;
h. write;
i. attach;
j. fork;
k. open;
l. read;
m. wait;
n. block;
o. close;
p. kill;
q. exec;
r. notify;
s. add;
25. Specify where the grub configuration files are located?
a. /var;
b. /etc;
c. / Usr / local / etc;
d. /boot;
26. Where are hybrid kernel modules stored?
a. In the processor paging registers;
b. In the segmentation registers of the processor;
c. In the address space of the kernel;
d. In the user's address space;
27. Which statement changes the importance of a process?
a. ps;
b. chmod;
c. nice;
a. Ismod;
28. The source of the source code whose operating system is considered pure but cannot have a POSIX standard?
a. MacOS;
b. Plan 9;
c. BSD UNIX;
d. UNIX OS;
e. SunOS;
f. Solaris;
g. Linux;
29. How will you stop the process permanently?
a. kill -15 pid;
b. kill -9 pid;
c. kill -17 pid;
d. kill pid;
e. kill -20 pid;

answer
Answers: 1

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 17:40, pnhandley01
Consider the simple 3-station assembly line illustrated below, where the 2 machines at station 1 are parallel, i. e., the product only needs to go through one of the 2 machines before proceeding to station 2.what is the throughput time of this process?
Answers: 2
image
Computers and Technology, 22.06.2019 23:30, Molly05
In my email i got a message it says a quick message and in message details on who its from its says nicole and under nicole is 50e0bf08e5b671@ualwgypg91wa5wl. uzo9kbud3qjwddygd5.vng -
Answers: 1
image
Computers and Technology, 22.06.2019 23:30, elizabethburkha
Which text format is this, "the text is transcribed exactly as it sounds and includes all the utterances of the speakers. "?
Answers: 2
image
Computers and Technology, 24.06.2019 00:20, danielmartinez024m
The guy wire bd exerts on the telephone pole ac a force p directed along bd. knowing the p must have a 720-n component perpendicular to the pole ac, determine the magnitude of force p and its component along line ac.
Answers: 2
Do you know the correct answer?
Hi, I need to answer the following questions related to cryptography, Linux and UNIX 1. Does it spe...

Questions in other subjects:

Konu
History, 17.09.2021 15:40
Konu
Mathematics, 17.09.2021 15:40