SYBEX -Wrong Questions from Skillset Flashcards

1
Q
Which civil law category would wrongful death be classified under:
Strict liability
Nuisance
Intentional
Negligence
A

Explanation: Wrongful death is an example of negligence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which one of these give best protection against brownouts?
Surge protectors
None of these
Regulators
Uninterrupted Power Supply
A

Explanation: Constant-voltage transformers can be used to regulate this fluctuation of power. They can use different ranges of voltage and only release the expected 120 volts of alternating current to devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A computer is running on a Windows platform and has nearly exhausted available physical memory for the active processes. In order to avoid exhausting of available memory, what must the operating system be able to do?
Run garbage collector
Paging
None of the above
Swapping
A

Explanation: Correct answer is “paging” - the key here is that swapping and paging are both viable alternatives in general for exhausted memory, but that the process is stated to be “active” and only paging is applicable when the process is active - swapping can only be used on inactive processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The component of an operating system that determines if a person can have access, and enforces access controls, is called ______________.
the reference monitor
the security kernel
The security enforcer

A

The security kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When is the auditing process started on a computer system?
Immediately after the computer starts up
When system is running at its normal run level
When the CPU is idle
In the state of suspension

A

Explanation: Auditing is started as soon as a computer starts up.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An open system is built upon _____ that have published specifications
interfaces
All selections are part of an open system
standards
protocols

A

Explanation: All choices are correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
The secure channel created in a trusted computing space is called a what?
Trusted path
Kernel
Security perimeter
Reference monitor
A

Explanation: The correct response is a trusted path. The trusted path is a secure channel used by the trusted computing space for communication with the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In a hierarchical database, a child node can have only one parent node.
True
False

A

Explanation: A hierarchical database is a tree, and in a tree, a child node has exactly one parent. The root node has no parent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
the usage of " ' " (apostrophe) in an URL can help to identify what kind of vulnerability?
SQL Injection
Memory Leak
Buffer Overflow
XSS (Cross-Site-Scripting)
A

Explanation: It’s SQL Injection. It can occur if the input parameters aren’t checked correctly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
the usage of " ' " (apostrophe) in an URL can help to identify what kind of vulnerability?
SQL Injection
Memory Leak
Buffer Overflow
XSS (Cross-Site-Scripting)
A

Explanation: It’s SQL Injection. It can occur if the input parameters aren’t checked correctly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly