Tough Questions 181-190

  1. You have three applications running on a single-core, single-processor system that supports multitasking. One of those applications is a word processing program that is managing two threads simultaneously. The other two applications are using only one thread of execution. How many application threads are running on the processor at any given time?
     
    (a) One
    (b) Two
    (c) Three
    (d) Four
     
    Answer:
    (a)
     
    Explanation:
    A good example of reading the question! There are four threads in total, but a system with only one single-core processor can only physically run one thread at a time.
     
  2. What type of federal government computing system requires that all individuals accessing the system have a need-to-know for all the information processed by the system?
     
    (a) Dedicated
    (b) System high
    (c) Compartmented
    (d) Multilevel
     
    Answer:
    (a)
     
  3. What is the most effecitive means of reducing the risk of losing the data on a mobile device, such as a notebook computer?
     
    (a) Defining a strong logon password
    (b) Minimising sensitive data stored on the mobile device
    (c) Using a cable lock
    (d) Encrypting the hard drive
     
    Answer:
    (b)
     
  4. What type of electrical component serves as the building block for dynamic RAM chips?
     
    (a) Capacitor
    (b) Resistor
    (c) Flip-flop
    (d) Transistor
     
    Answer:
    (a)

    Explanation:
    (c) Flip-flops are used in static RAM (SRAM).
     
  5. In which of the following security nodes can you be assured that all users have access permissions for all information processed by the system, but not necessarily need-to-know for all the information?
     
    (a) Dedicated
    (b) System high
    (c) Compartmented
    (d) Multilevel
     
  6. Which of the following is a layer of the ring protection scheme that is not normally implemented in practice?
     
    (a) Layer 0
    (b) Layer 1
    (c) Layer 3
    (d) Layer 4
     
    Answer:
    (b)
     
    Explanation:
    The ring model is numbered from 0-3. Ring 0 contains the security kernel. Ring 1 & 2 contain device drivers but are not normally implemented in practice. Ring 3 contains user applications. Ring 4 does not exist!
     
  7.  What is the most common form of perimeter security device or mechanism?
      
    (a) Security guards
    (b) Fences
    (c) CCTV
    (d) Lighting
     
    Answer:
    (d)
     
  8.  What is the most common & inexpensive form of physical access control device?
     
    (a) Lighting
    (b) Security guard
    (c) Key locks
    (d) Fences
     
    Answer:
    (c)
     
  9. What type of motion detector senses changes in the electrical or magnetic field surrounding a monitored object?
     
    (a) Wave
    (b) Photoelectric
    (c) Heat
    (d) Capacitance
     
    Answer:
    (d)
     
  10. No matter what form of physical access control is used, a security guard or other monitoring system may be deployed to prevent all but which of the following?
     
    (a) Piggybacking
    (b) Espionage
    (c) Masquerading
    (d) Abuse
     
    Answer:
    (b)
     
    Explanation:
    Espionage cannot be prevented by physical access controls
     
  11. Which of the following is NOT a disadvantage of using security guards?
     
    (a) Security guards are usually unaware of the scope of the operations within a facility.
    (b) Not all environments & facilities support security guards
    (c) Not all security guards are themselves reliable
    (d) Prescreening, bonding & training do not guarantee effective and reliable security guards
     
    Answer:
    (a)
     
    Explanation:
    Security guards are usually unaware of the scope of the operations within a facility, which supports confidentiality of those operations and thus helps reduce the possibility that a security guard will be involved in the disclosure of confidential information.

Leave a comment

Design a site like this with WordPress.com
Get started