Search Header Logo
NOS Revision

NOS Revision

Assessment

Presentation

Computers

University

Hard

Created by

Aidora Abdullah

Used 2+ times

FREE Resource

1 Slide • 34 Questions

1

NOS Revision

Slide image

2

Open Ended

Provide THREE differences between 'protection' and 'security'.

3

Open Ended

Describe five functions of client software. (Hint: socket programming)

4

Multiple Choice

Question image

The UNIX command that will display the following output is the _________ command.

1

date

2

time

3

cat

4

cal

5

Multiple Choice

The UNIX directory that contains configuration files the system uses when the computer starts is known as the ___________ directory.

1

/home

2

/etc

3

/bin

4

/var

6

Open Ended

Differentiate between thick and thin client.

7

Multiple Choice

The CIA triad are known as the __________ of computer security.

1

goals

2

methods

3

subjects

4

objects

8

Open Ended

Provide THREE examples of internal threats.

9

Multiple Choice

The reserved port number for the File Transfer Protocol (FTP) is __________.

1

21

2

80

3

22

4

25

10

Multiple Choice

Which of the following is NOT an example of a Linux file system?

1

ReiserFS

2

EXT2

3

NTFS

4

XFS

11

Open Ended

Provide THREE reasons that can cause a server to be overloaded.

12

Multiple Choice

A __________ network is a network that covers an area within 100km.

1

LAN

2

MAN

3

WAN

4

peer-to-peer

13

Multiple Choice

Ethernet is a protocol at the __________ layer of the TCP/IP protocol suite.

1

application

2

transport

3

network

4

network interface

14

Multiple Choice

Question image

The diagram shows how __________ is done on a network.

1

peer-to-peer communication

2

encoding

3

encapsulation

4

encryption

15

Open Ended

Differentiate between the socket(), bind() and connect() functions in socket programming.

16

Fill in the Blanks

Type answer...

17

Multiple Select

The TCP is responsible for the following:

1

error-checking

2

data recovery

3

connection-oriented

4

sscure transmission

18

Open Ended

Explain in detail the importance of a socket program with regard to client-server systems.

19

Open Ended

Explain in detail why a client socket does not use the bind() system call.

20

Multiple Select

Which of the following are 'types of separations'; with regard to good protection mechanisms for the Operating System?

1

physical

2

temporal

3

cryptographic

4

modular

21

Open Ended

Differentiate between a typical client socket program and a server socket program.

22

Multiple Choice

True or false: A server can only accommodate a limited number of client requests at a time.

1

True

2

False

23

Fill in the Blanks

Type answer...

24

Open Ended

Explain 3 advantages of the 3-tier client-server architecture.

25

Multiple Choice

Which statement correctly describes steps in the OSI data encapsulation process?

1

The data link layer adds physical source and destination addresses and an FCS to the segment.

2

Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information.

3

The transport layer divides a data stream into segments and may add reliability and flow control information.

4

The presentation layer translates bits into voltages for transmission across the physical link.

26

Multiple Choice

The UNIX command '> newfile' is an example of file creation using the ____________.

1

vi text editor

2

touch command

3

output redirection operator

4

cat command

27

Multiple Choice

Which of the following command allows a computer user to execute commands with the privileges of another user account?

1

admin

2

superuser

3

sudo

4

su

28

Open Ended

Access control is a form of file system security method. Evaluate the effectiveness of access control for Linux-based file systems.

29

Multiple Choice

What does the permission string drwxr-xr-- correspond with in octal format?

1

642

2

655

3

740

4

754

30

Multiple Choice

Which address identifies a process on a host?

1

specific address

2

port address

3

logical address

4

physical address

31

Open Ended

Name 5 distinct types of Application Client and Server software.

32

Open Ended

Question image

Based on the figure shown, assume you are currently in the dirAAA directory, provide the command to change to the dirC directory using a relative path.

33

Fill in the Blanks

Type answer...

34

Open Ended

Question image

Question 3: In the Linux operating system, the /etc/passwd text file stores essential user account information, which is required during login. The image below is a sample entry of the file. Briefly explain any SIX (6) fields (separated by the colon symbol), that appear in the sample entry of the file given.

35

Open Ended

Socket programming; specifically “Internet sockets”, while generally unseen by normal end users, are the backbone of nearly all web applications. By using a web server service/architecture as an example, explain in detail the importance of socket programming for client-server models, based on the TCP/IP Protocol suite. Provide FIVE (5) explanations. NOTE: You are not required to include any socket codes or network diagrams in your answer. (Note: sample LAQ question)

NOS Revision

Slide image

Show answer

Auto Play

Slide 1 / 35

SLIDE