subject
Computers and Technology, 29.12.2020 15:20 manou76

Hi, I need to answer the following questions related to cryptography, Linux and UNIX 1. Does it specify what user protection entails?
a. Use of certification methods;
b. Starting a pseudo-device;
c. Raising a proxy server;
d. Activation of daemons;
e. Using the 9 rwx bits;
f. Activating openssl;
2. Specify what is the basic application of libressl?
a. Formation of a security substrate;
b. Message encryption;
c. Data certification;
d. Securing the browser while browsing the Internet;
3. Does it mean building security at OSI levels in the first place?
a. Starting an antivirus;
b. Formation of certification methods;
c. Installation of encryption applications;
d. Securing entity tables;
4. What does the enable option do?
a. Starts the service and activates it in the crontab;
b. Start the service at the current boot;
c. Temporarily starts the service and then shuts it down;
d. Starts the boot service;
5. Specify which instruction starts a device?
a. block;
b. write;
c. sleep;
d. wait;
e. kill;
f. seek;
g. fork;
h. detach;
i. modify;
j. notify;
k. nice;
l. exec;
m. add;
n. read;
o. exit;
p. delete;
q. close;
r. open;
s. attach;

6. Where are hybrid kernel modules stored?
a. In the address space of the kernel;
b. In the user's address space;
c. In the processor segmentation registers;
d. In the processor paging registers;
7. What statement is used in openbsd to view all services?
a. /etc/rc. d/* status;
b. service -status-all;
c. systemctl | grep status;
d. /etc/init. d/* status;
e. and service --service-all;
f. systemctl list-unit-files --type service -all;
g. rcctl --status-all;
8. How do exokernels differ?
a. Through libraries segregated by namespaces;
b. Through constructive simplicity;
c. By extended user privileges,
d. Through layers and CPIs;
e. By the size of the source code;
f. Through increased security;
g. By components and their location;
9. Is the highest security class A2?
a. FALSE
b. TRUE
10. Are the binaries used mainly by the root located in the / bin and / usr / bin directories?
a. FALSE
b. TRUE
11. Which operating system has security tags?
a. А1;
b. B1;
c. С2;
d. B3;
e. B2;
f. A2;
12. What partition is missing when installing the operating system under BIOS?
a. zfs;
b. ufs;
c. fat;
d. ext4;
e. esp:
f. swap;

13. Can't the physical link create a link to the directories?
a. FALSE
b. TRUE
14. What will the file extension have: "dd if = file. xxx of = devicename bs = 4M"?
a. exe;
b. img;
c. tar;
d. iso;
15. What action is not part of the rcd service manager?
a. disable;
b. run;
c. check;
d. reload;
e. stop;
f. enable;
16. What does the enable option do?
a. Temporarily starts the service and then shuts it down;
b. Start the service at the current boot;
c. Starts the boot service;
d. Starts the service and activates it in the crontab;
17. Specifies the correct method for the file to have the following rights: r - r-x-w-?
a. 742;
b. 463;
c. 452;
d. 215;
e. 136;
18. Specifies the correct method for the file to have the following rights: r-x-wx-w-?
a. 324;
b. 143;
c. 471;
d. 721;
e. 532;
19. Does it specify what process protection entails?
a. Use of certification methods;
b. Activating daemons,
c. Starting a pseudo-device;
d. Setting up a proxy server:
e. Using the 9 bits rwх;
f. Activating openssl;

20. Does it mean building security at OSI levels in the first place?
a. Starting an antivirus;
b. Formation of certification methods;
c. Installation of encryption applications;
d. Securing entity tables;
21. In which hierarchy are the user applications additionally installed placed?
a. 3;
b. 5;
c. 1;
d. 4;
e. 2;
22. Which file system has a tabular checksum?
a. ext3;
b. UFS;
c. NTFS;
d. JFS;
e. BtrFS;
f. ext4;
g. XFS;
h. ZFS;
i. ext2;
23. Specify which statement will stop a user's activity?
a. fork;
b. sleep;
c. block;
d. exec;
e. detach;
f. Notify;
g. add;
h. seek:
i. kill;
j. modify;
k. wait;
l. nice;
m. open;
n. attach;
o. delete;
p. kill;
q. exec;
r. notify;
s. add;

24. Specify which statement changes the priority of a process?
a. seek;
b. detach;
c. nice;
d. modify;
e. sleep;
f. delete;
g. exit;
h. write;
i. attach;
j. fork;
k. open;
l. read;
m. wait;
n. block;
o. close;
p. kill;
q. exec;
r. notify;
s. add;
25. Specify where the grub configuration files are located?
a. /var;
b. /etc;
c. / Usr / local / etc;
d. /boot;
26. Where are hybrid kernel modules stored?
a. In the processor paging registers;
b. In the segmentation registers of the processor;
c. In the address space of the kernel;
d. In the user's address space;
27. Which statement changes the importance of a process?
a. ps;
b. chmod;
c. nice;
a. Ismod;
28. The source of the source code whose operating system is considered pure but cannot have a POSIX standard?
a. MacOS;
b. Plan 9;
c. BSD UNIX;
d. UNIX OS;
e. SunOS;
f. Solaris;
g. Linux;
29. How will you stop the process permanently?
a. kill -15 pid;
b. kill -9 pid;
c. kill -17 pid;
d. kill pid;
e. kill -20 pid;

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 21.06.2019 17:30
How many pairs of chromosomes do human body cells contain?
Answers: 2
question
Computers and Technology, 22.06.2019 09:50
What is a rush associated with alcohol?
Answers: 1
question
Computers and Technology, 23.06.2019 03:30
Hashtags serve to identify the topic of a given tweet true false
Answers: 2
question
Computers and Technology, 23.06.2019 19:30
Anul 2017 tocmai s-a încheiat, suntem trişti deoarece era număr prim, însă avem şi o veste bună, anul 2018 este produs de două numere prime, 2 şi 1009. dorel, un adevărat colecţionar de numere prime, şi-a pus întrebarea: “câte numere dintr-un interval [a,b] se pot scrie ca produs de două numere prime? “.
Answers: 3
You know the right answer?
Hi, I need to answer the following questions related to cryptography, Linux and UNIX 1. Does it spe...
Questions
question
History, 08.07.2019 17:30