Wrong Questions from Skillset Flashcards
Which civil law category would wrongful death be classified under: Strict liability Nuisance Intentional Negligence
Explanation: Wrongful death is an example of negligence.
Which one of these give best protection against brownouts? Surge protectors None of these Regulators Uninterrupted Power Supply
Explanation: Constant-voltage transformers can be used to regulate this fluctuation of power. They can use different ranges of voltage and only release the expected 120 volts of alternating current to devices.
A computer is running on a Windows platform and has nearly exhausted available physical memory for the active processes. In order to avoid exhausting of available memory, what must the operating system be able to do? Run garbage collector Paging None of the above Swapping
Explanation: Correct answer is “paging” - the key here is that swapping and paging are both viable alternatives in general for exhausted memory, but that the process is stated to be “active” and only paging is applicable when the process is active - swapping can only be used on inactive processes
The component of an operating system that determines if a person can have access, and enforces access controls, is called ______________.
the reference monitor
the security kernel
The security enforcer
The security kernel
When is the auditing process started on a computer system?
Immediately after the computer starts up
When system is running at its normal run level
When the CPU is idle
In the state of suspension
Explanation: Auditing is started as soon as a computer starts up.
An open system is built upon _____ that have published specifications
interfaces
All selections are part of an open system
standards
protocols
Explanation: All choices are correct
The secure channel created in a trusted computing space is called a what? Trusted path Kernel Security perimeter Reference monitor
Explanation: The correct response is a trusted path. The trusted path is a secure channel used by the trusted computing space for communication with the system.
In a hierarchical database, a child node can have only one parent node.
True
False
Explanation: A hierarchical database is a tree, and in a tree, a child node has exactly one parent. The root node has no parent.
the usage of " ' " (apostrophe) in an URL can help to identify what kind of vulnerability? SQL Injection Memory Leak Buffer Overflow XSS (Cross-Site-Scripting)
Explanation: It’s SQL Injection. It can occur if the input parameters aren’t checked correctly.
the usage of " ' " (apostrophe) in an URL can help to identify what kind of vulnerability? SQL Injection Memory Leak Buffer Overflow XSS (Cross-Site-Scripting)
Explanation: It’s SQL Injection. It can occur if the input parameters aren’t checked correctly.