PA Flashcards

1
Q

What is an operating system?

An application that runs on bare hardware

An application that runs within a kernel

Software that runs on bare hardware

Software that runs within a kernel

A

Software that runs on bare hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which type of CPU instruction sets are supported by the CPU user mode?

Both privileged and non-privileged

Neither privileged nor non-privileged

Only privileged

Only non-privileged

A

Only non-privileged

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are two locations where firmware can be stored?

Choose 2 answers.

Flash memory

Read-only memory (ROM)

Cache memory

Dynamic random-access memory (DRAM)

A

Flash memory

Read-only memory (ROM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which generation of computers were large-scale integrated circuits used to develop personal computers for desktop and laptop operating systems?

2nd

3rd

4th

5th

A

4th

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A company requires a computing environment that supports high-volume data processing and the management of a large amount of storage.

Which computing environment should the company use?

Desktop

Server

Laptop

Mainframe

A

Mainframe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a system service?

A component of an operating system responsible for memory management

A set of files used to store and retrieve operating system configuration information

A program designed for end-user execution in the operating system

An application included with an operating system to provide functionality beyond the kernel

A

An application included with an operating system to provide functionality beyond the kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A company needs to determine when a computer experiences a microprocessor interrupt that is the result of a division by zero.

Which operating system service should be used?

Communication

Error detection

Logging

Deadlock detection

A

Error detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which interface allows combining multiple programs using the output from one as the input to another?

Graphical user interface (GUI)

Voice-user interface (VUI)

Command-line interface (CLI)

Natural user interface (NUI)

A

Command-line interface (CLI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which command is used to determine the number of lines in a file?

copy

dir

wc

del

A

wc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which cyberattack prevents a legitimate user from accessing an application in a timely manner?

Denial-of-service

Information disclosure

Unauthorized use

Information destruction

A

Denial-of-service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which operating environment is used to run an embedded system?

Mainframe

Server

Desktop

Real-time

A

Real-time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which component is responsible for running and suspending tasks in a multitasking operating system?

Memory manager

Network manager

Process manager

Storage manager

A

Process manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a thread?

System component allowed to run a privileged instruction set

Part of a process that can run concurrently with other parts

Application providing a user interface to system calls

Instantiation of a process with a unique identifier

A

Part of a process that can run concurrently with other parts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the two properties of threads?

Choose 2 answers.

Using multiple processes within a thread is more efficient than using multiple threads

Using multiple threads within a process is more efficient than using multiple processes

User-level threads are faster to manage than kernel-level threads

Kernel-level threads are faster to manage than user-level threads

A

Using multiple threads within a process is more efficient than using multiple processes

User-level threads are faster to manage than kernel-level threads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which resource is virtualized by multitasking?

Disk

Memory

Network

Processor

A

Processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which technique is used to execute several jobs by time-sharing among them?

Multitasking

Multiprogramming

Abstraction

Virtualization

A

Multitasking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a computer program in execution called?

Trap

Thread

Task

Process

A

Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the relationship between threads, processes, and global data?

All threads within a process share the same copy of global data.

All processes within a thread share the same copy of global data.

Each thread within a process has its own copy of global data.

Each process within a thread has its own copy of global data.

A

All threads within a process share the same copy of global data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does each thread of a multi-threaded process use to access shared code?

Kernel

Application

Program counter

Stack pointer

A

Program counter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a critical section?

An area of code that cannot be entered by a process while another process is executing a corresponding area of the code.

An area of code that cannot be modified by the operating system.

An area of code that can be entered by a process while another process is executing a corresponding area of the code.

An area of code that can be modified by the operating system.

A

An area of code that cannot be entered by a process while another process is executing a corresponding area of the code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do threads differ from processes?

Threads may contain multiple processes.

Threads execute portions of a program within a process.

Processes are faster to destroy than threads.

Processes execute portions of a program within a thread.

A

Threads execute portions of a program within a process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which scheduler is used to decide the ready processes that should run next on the CPU?

Long-term

Short-term

Preemptive

Non-preemptive

A

Short-term

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A process is not attempting to enter the critical section (CS), but it is preventing other processes from entering the CS.

Which situation was caused by this process?

Concurrency

Starvation

Lockout

Deadlock

A

Lockout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which step is completed first during an input/output (I/O) call?

The direct memory access controller transfers data to kernel memory

The interrupt handler signals device driver

The process is placed on the wait queue

The device driver allocates kernel buffer space

A

The process is placed on the wait queue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which free memory space management strategy allocates the smallest free partition that meets the requirement of the requesting process?

Best fit

First fit

Next fit

Worst fit

A

Best fit

16
Q

Which method does the operating system use to divide system memory into contiguous, equal-sized partitions?

Fragmentation

Relocation

Paging

Swapping

A

Paging

17
Q

What is the physical memory size for an address size of 8 bits?

16

64

256

1,024

A

256

18
Q

What causes a page fault?

Modified bit is set to 0

Present bit is set to 1

Present bit is set to 0

Modified bit is set to 1

A

Present bit is set to 0

18
Q

What should be used to improve memory utilization when loading external references?

Dynamic linking

Static linking

Swapping

Compaction

A

Dynamic linking

18
Q

Why are approximations used in place of the least-recently-used (LRU) algorithm?

Higher precision

Higher efficiency

Selects longest unused pages

Guarantees fewer page faults

A

Higher efficiency

19
Q

What describes the 50% rule in external memory fragmentation?

One-fourth of memory may be lost.

One-fourth of memory is occupied.

One-third of memory may be lost.

One-third of memory is occupied.

A

One-third of memory may be lost.

20
Q

What describes the difference between internal and external fragmentation?

Choose 2 answers.

External fragmentation occurs when memory blocks are divided into variable-sized partitions.

External fragmentation occurs when memory blocks are divided into fixed-sized partitions.

Internal fragmentation occurs when memory blocks are divided into fixed-sized partitions.

Internal fragmentation occurs when memory blocks are divided into variable-sized partitions.

A

External fragmentation occurs when memory blocks are divided into variable-sized partitions.

Internal fragmentation occurs when memory blocks are divided into fixed-sized partitions.

20
Q

What does the memory manager do that can lead to poor system performance?

Choose 2 answers.

Fails to allocate memory as needed, causing processes to crash

Is unable to allocate contiguous free blocks as needed, causing processes to wait

Suspends processes requesting memory, causing them to stop responding

Is forced to compact memory so it can fulfill allocations, causing processes to wait

A

Is unable to allocate contiguous free blocks as needed, causing processes to wait

Is forced to compact memory so it can fulfill allocations, causing processes to wait

21
Q

What are two effects of paging in the address space?

Choose 2 answers.

Permits the physical address of a process to be noncontiguous

Divides the logical address space of a process into equal-sized partitions

Creates unused address spaces called external fragmentation

Divides the logical address space of a process into different-sized partitions

A

Permits the physical address of a process to be noncontiguous

Divides the logical address space of a process into equal-sized partitions

22
Q

What is a page in memory management?

Fixed-size contiguous block of a logical address space identified by a single number

Fixed-size contiguous block of physical memory identified by a single number

Variable-size noncontiguous block of physical memory identified by a single number

Variable-size noncontiguous block of a logical address space identified by a single number

A

Fixed-size contiguous block of a logical address space identified by a single number

22
Q

What is used to determine the number of processes that can run concurrently?

Memory segmentation

Demand paging

Scheduling

Load control

A

Load control

23
Q

What are the two measures of positioning time?

Choose 2 answers.

Moving the disk arm to the desired cylinder

Rotating the desired sector to the disk head

Transferring data from the disk to the host system

Transferring data to and from the disk media

A

Moving the disk arm to the desired cylinder

Rotating the desired sector to the disk head

23
Q

A company needs to ensure consistent performance by decreasing the density of bits from inner tracks to outer tracks.

Which hard disk method should be used?

Constant angular acceleration

Constant angular velocity

Constant linear velocity

Constant magnetic field

A

Constant angular velocity

24
Q

Which disk type provides direct access to a secondary storage device as an array of blocks with no file system?

Boot

Raw

Virtual

Swap

A

Raw

24
Q

What is an advantage of swapping?

Provides efficient usage of memory by deallocating dynamic space when processes complete and allocating memory at run time

Provides efficient usage of memory by reducing external fragmentation on a computer

Allows processes that load the same DLL at the same base address to share a single copy of the DLL in physical memory

Allows computers to execute more processes than there is available physical memory on a computer

A

Allows computers to execute more processes than there is available physical memory on a computer

25
Q

Which file attribute should be used to identify who can access a file?

Location

Protection

Type

Size

A

Protection

25
Q

Which scheduling system should be used to stop a process that is currently running and select another process to run?

Long-term

Short-term

Preemptive

Non-preemptive

A

Preemptive

26
Q

Which data structure represents the allocation status of each disk block?

Queue

Linked list

Bitmap

Binary tree

A

Bitmap

27
Q

Which latency waits for the requested data to pass under the drive head of a magnetic hard disk?

Seek time

Sector overhead time

Peak transfer rate

Rotational delay

A

Rotational delay

27
Q

What is the determining factor for sustained throughput in magnetic storage?

Disk size

Track seek time

Data transfer rate

Rotational latency

A

Data transfer rate

28
Q

What can be used to access Dropbox?

Common Internet File System - CIFS

Internet Small Computer System Interface - iSCSI

Network-attached storage - NAS

Application programming interface - API

A

Application programming interface - API

29
Q

What is a direct memory access (DMA) controller?

Program invoked by the driver to access main memory

Hardware device allowing access of main memory without the CPU

Hardware device used by the CPU to access main memory

Program invoked by the CPU to access main memory

A

Hardware device allowing access of main memory without the CPU

29
Q

What is partitioning?

Changing the type of file system in a storage region

Changing the size of blocks

Reallocating blocks into a contiguous space

Creating groups of blocks on secondary storage

A

Creating groups of blocks on secondary storage

30
Q

Which user authentication method has the form of a dialogue between user and system?

One-time password

Challenge-response

Single sign-on

Biometrics

A

Challenge-response

30
Q

What provides asymmetric cryptography?

Lempel-Ziv-Markov Algorithm (LZMA)

Rivest-Shamir-Adleman (RSA)

Data Encryption Standard (DES)

Advanced Encryption Standard (AES)

A

Rivest-Shamir-Adleman (RSA)

31
Q

What is a symmetric key algorithm?

Data encryption standard (DES)

Huffman code

Hamming code

Rivest-Shamir-Adleman (RSA)

A

Data encryption standard (DES)

32
Q

An access matrix list of three domains and six objects is depicted in the following table:

O1 O2 O3 O4 O5 O6

D1 r rwx
D2 rwx rwx r r
D3 rwxo rwx rwxo rwx rwxo

What is the length of the shortest capability list?

1

2

4

5

A

2

32
Q

An access matrix list of three domains and six objects is depicted in the following table:

O1 O2 O3 O4 O5 O6

D1 r rwx
D2 rwx rwx r r
D3 rwxo rwx rwxo rwx rwxo

What is the length of the shortest access list?

1

2

4

5

A

1

32
Q

Which two techniques guard against unauthorized activities when running code written by others?

Choose 2 answers.

Sandboxing

Compiling

Compression

Interpretation

A

Sandboxing

Interpretation

33
Q

What is a key that is used by a recipient to decrypt a message encrypted with asymmetric encryption?

Public

Private

Shared

Hash

A

Private

34
Q

What is the benefit of asymmetric cryptography?

Faster encryption and decryption operations

No need to exchange secret keys

Uses the same key for encryption and decryption

Higher computational complexity of encryption and decryption

A

No need to exchange secret keys

34
Q

When should digests be used?

Establishing an undeniable link between the document and its sender

Accelerating document encryption

Reducing encrypted document size

Reducing computational complexity of document decryption

A

Establishing an undeniable link between the document and its sender

34
Q

Which technique involves requesting an unsuspecting user to disclose their credit card information on a fake website that looks legitimate?

Logic bomb

Login spoofing

Phishing

Trapdoor

A

Phishing

35
Q

Which technique is used to bypass user authentication?

Buffer overflow

Login spoofing

Back door

Phishing

A

Back door

36
Q

Which cyberattack technique is mitigated by using the CTRL+ALT+DEL key sequence in the Windows operating systems?

Back door

Information leaking

Logic bomb

Login spoofing

A

Login spoofing