logo

CEG 2350 Final Exam Questions

   

Added on  2023-05-27

30 Pages6331 Words487 Views
NOTE: THE ANSWERS ARE MARKED IN YELLOW
Question 1
Which of the following is true?
A) SHA-2 is a set of cryptographic hash functions designed by the U.S. National Security Agency (NSA) and published in 2001 by the
National Institute of Standards and Technology (NIST) as a U.S. Federal Information Processing Standard (FIPS).
B) SHA-2 digests (checksums) are 224, 256, 384 or 512 bits.
C) We should unquestioningly trust NSA provided cryptographic hash functions because the NSA has never hidden "back doors" to enable
easy unauthorized decryption by governmental organizations.
D) Carnegie Mellon University (CMU) Software Engineering Institute (SEI) now says that SHA-2 "should be considered cryptographically
broken and unsuitable for further use.”
Question 1 options:
C, and D
A and B
A, B, and D
A, B, and C
Question 2
Which of the following may operating system process/thread schedulers attempt to optimize?
A) CPU Utilization: Percent of time that the CPU is running threads
B) CPU Throughput: Number of completed “operations” per second.
C) Turnaround time: Process end time – Process start time.
D) Response time: Minimize total time process waits while ready to run
E) Waiting time: Minimize total time process spends not ready to run
F) Efficiency: Conserve power or other resources
G) Latency: Minimize (or standardize) process response times

H) Fairness: Distribute resources to processes equitably
Question 2 options:
All but B
All but H
All of them
Only H
Question 3
Which of the following statements is true? You may select more than one.
Question 3 options:
A
)
In many file system designs, there are two kinds of fragmentations possible. (i) File content is stored in disk
blocks. File content is seldom an exact multiple of disk blocks, so the last block used is almost never full.
This is known as internal fragmentation. (ii) Large files are almost always stored in non-consecutive blocks
scattered around non-volatile memory. This is known as external fragmentation.
B
)
sudo apt-get update updates the locally stored database of what applications are installed and
what newer versions are now available. sudo apt-get update replaces older applications with
newer ones.

C) In Debian Linux version like Lubuntu, sudo apt-get install
nameOfThePackage installs the package; sudo apt-get remove
nameOfThePackage uninstalls it. The command dpkg -l lists all the packages
installed.
D) In Windows, software is packaged in a file format known as .msi,
and msiexec.exeinstalls such packages. When you double-click on
a .msi file, the Graphical User Interface (GUI) front-end of this
program is invoked by association. The msiexecprogram has
many command-line switches not available through the GUI.
Question 4
Which of the following statements are true?
A) Any type of file on a computer can be placed under version control.
B) SCCS, CVS, RCS, SVN, and GIT are all version control tools.
C) All version control tools require "check out" and "check in" of files to prevent simultaneous edits to the same file by different users.
D) Version control systems are useful for projects implemented by a single person.
Question 4 options:
A and B

A, B, and C
A, B, and D
A and C
Question 5
Which of the following statements are true?
A) A router is a networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on
the Internet.
B) An Ethernet hub is a network hardware device for connecting multiple Ethernet devices together and making them act as a single network
segment. It has multiple input/output (I/O) ports, in which a signal introduced at the input of any port appears at the output of every other port.
C) An Internet Service Provider (ISP) is an organization that provides services for accessing and using the Internet.
D) The Domain Name System (DNS) is a decentralized naming system for computers, services, or any resource connected to the Internet. It
translates domain names to the numerical IP addresses needed for the purpose of locating and identifying computer services and devices with
the underlying network protocols.
E) In a man-in-the-middle attack, the attacker secretly relays and possibly alters the communication between two parties who believe they are
directly communicating with each other. A man-in-the-middle attack can be used to circumvent asymmetric cryptographic protocols.
Question 5 options:
A, D, E
B, C, E
A, B, C, D
A, B, C
B, C, D

Question 6
Which of the following statements are true?
A) A child process usually “inherits” the run time environment/permissions of the parent process that starts it.
B) Child processes return status to the parent when the child terminates.
C) Child processes terminate if the parent terminates unless the child is detached from its parent.
D) A shell is usually the parent of each process started by the shell.
Question 6 options:
B, C, and D
A, B, and C
A, B, C, and D
C, and D
Question 7
Which of the following statements are true about FIFO (Batch) Process Scheduling?
A) FIFO (Batch) Process Scheduling is not preemptive.
B) FIFO (Batch) Process Scheduling is not equitable (one process may hog the CPU).
C) Latency of queued process start is often unpredictable
D) Most modern operating systems use FIFO (Batch) Process Scheduling because it is very efficient.

Question 7 options:
Only C
Only D
A, B, and D
A, B, and C
Question 8
Which of the following statements are true?
A) Multi-user systems have user accounts to enable accounting, security, logging, and resource management per user.
B) Multi-user systems correlate usernames with user IDs.
C) File ownership may be correlated with a user ID.
D) Multi-user systems may require user login and authentication to determine authorization/permission to access system resources.
E) Modern versions of the Windows operating systems are roughly equivalent to a single-user, single-account operating systems; this means
that all processes can modify the boot sector and perform other low-level hard drive modifications. This enables viruses and other
clandestinely installed software to integrate themselves with the operating system in a way that is difficult to detect or undo.
Question 8 options:
A, B, D, and E
Only E
A, B, C, and D
A, B, C, D, and E
Question 9

End of preview

Want to access all the pages? Upload your documents or become a member.