Вы находитесь на странице: 1из 4

QUIZ IN UNIX

1. An information security classification that prevents unauthorized disclosure of information


a. Confidentiality
b. Integrity
c. Availability
d. Authentication
2. An information security classification that prevents unauthorized modification of information
a. Confidentiality
b. Integrity
c. Availability
d. Authentication
3. A security service classification that restricts access to resources to authorized parties
a. Authentication
b. Access control
c. Availability
d. None of the above
4. It is a security attack classification that is an attack on confidentiality
a. Interruption
b. Interception
c. Modification
d. Fabrication
5. What is the name of level 7 security layer
a. Internal-demark
b. Personnel
c. LAN
d. Policy
6. Unix was one of the operating system written in what programming language?
a. C#
b. Ruby
c. C language
d. Phyton
7. In what year when Ken Thompson, Dennis Ritchie and others started working on the "little-
used PDP-7 in a corner" at Bell Labs and what was to become UNIX.
a. 1969
b. 1971
c. 1983
d. 1988
8. In what year that Sun Microsystems released the bulk of its Solaris system code (based on UNIX
System V Release 4) into an open source project called Open Solaris
a. 2000
b. 2003
c. 2005
d. 2007
9. Which statement is wrong about UNIX?
a. Multi-user operating system designed for flexibility and adaptability
b. UNIX was designed to be a small, flexible system used exclusively by programmers
c. Due to its portability, flexibility, and power, UNIX has become a leading operating
system for workstations
d. None of the choices
10. In 1973, what company released Version 5 Unix and licensed it to educational institutions, and
licensed 1975's Version 6 to companies for the first time.
a. AT & T
b. SCO Group
c. Sun Microsystem
d. Calderra Systems
11. What is it called, in which a process in main memory is copied to the preconfigured space on the
hard disk, called swap space, to free up that space of memory
a. Swapping
b. Demand Paging
c. Memory Configuration
d. Freeing
12. The following are the advantages of Demand Paging, which is not?
a. More I/O needed
b. Less memory needed
c. Faster response
d. Increased degree of multi programming
13. It is a mode of execution where the virtual memory scheme is in effect
a. User Mode
b. Kernel Mode
c. Scheme Mode
d. Memory Mode
14. It is a mode of execution where the virtual memory scheme is in effect
a. User Mode
b. Kernel Mode
c. Scheme Mode
d. Memory Mode
15. Which of the following is a Process Scheduling Queues?
a. On-job Queue
b. Device Queue
c. Rear Queue
d. Dequeue
16. A type of processes in UNIX where performs the function in a system wide basis
a. User Process
b. Kernel Process
c. Daemon Process
d. Basic Process
17. It is used to transfer form user mode to system mode
a. System processes
b. User process
c. System Call
d. User Call
18. Which is not true in process state UNIX
a. User running Execute in use mode
b. Kernel running Execute in kernel mode
c. Ready to run in memory ready to run as soon as the kernel schedules it
d. Operating system functions executes within user process
19. What is the name of layer 3 in security layers?
a. Personnel
b. Gateway
c. Packet-Filter
d. External-Demark
20. A security plan category that prevents intruders being able to get into your system
a. Locking Down
b. Logging
c. Detecting
d. Testing
21. Subroutines working with OS to supervise transmission of data between main memory &
peripheral unit
a. Innovative Feature
b. Transmission
c. Device Drivers
d. Supervisors
22. In 1973, what version of Unix was rewritten in the higher-level language C
a. Version 2
b. Version 3
c. Version 4
d. Version 5
23. Is a file on the system that contains data, text, or program instructions
a. Ordinary Files
b. Directories
c. Special Files
d. Data files
24. A file access mode that grants the capability to read
a. Execute
b. Write
c. Read
d. Delete
25. A file access mode that grant the capability to modify or remove the content of the file
a. Execute
b. Write
c. Read
d. Delete
26. In what year does Apple Mac OS X certified to UNIX 03.
a. 2007
b. 2008
c. 2009
d. 2010
27. It is used as an index to array to access appropriate code for specific device driver
a. Minor device number
b. Class
c. Major device number
d. Class number
28. Passed to device driver as argument & is used to access one of several identical physical devices
a. Minor device number
b. Class
c. Major device number
d. Class number
29. In swapping, it allocates contiguous space on the swap device without fragmentation.
a. User
b. Kernel
c. Embedded program
d. Allocator
30. A security plan category that recover in-place a compromised system.
a. Detecting
b. Testing
c. Logging
d. Recovering

Вам также может понравиться