subject
Computers and Technology, 29.12.2020 15:20 manou76

Hi, I need to answer the following questions related to cryptography, Linux and UNIX 1. Does it specify what user protection entails?
a. Use of certification methods;
b. Starting a pseudo-device;
c. Raising a proxy server;
d. Activation of daemons;
e. Using the 9 rwx bits;
f. Activating openssl;
2. Specify what is the basic application of libressl?
a. Formation of a security substrate;
b. Message encryption;
c. Data certification;
d. Securing the browser while browsing the Internet;
3. Does it mean building security at OSI levels in the first place?
a. Starting an antivirus;
b. Formation of certification methods;
c. Installation of encryption applications;
d. Securing entity tables;
4. What does the enable option do?
a. Starts the service and activates it in the crontab;
b. Start the service at the current boot;
c. Temporarily starts the service and then shuts it down;
d. Starts the boot service;
5. Specify which instruction starts a device?
a. block;
b. write;
c. sleep;
d. wait;
e. kill;
f. seek;
g. fork;
h. detach;
i. modify;
j. notify;
k. nice;
l. exec;
m. add;
n. read;
o. exit;
p. delete;
q. close;
r. open;
s. attach;

6. Where are hybrid kernel modules stored?
a. In the address space of the kernel;
b. In the user's address space;
c. In the processor segmentation registers;
d. In the processor paging registers;
7. What statement is used in openbsd to view all services?
a. /etc/rc. d/* status;
b. service -status-all;
c. systemctl | grep status;
d. /etc/init. d/* status;
e. and service --service-all;
f. systemctl list-unit-files --type service -all;
g. rcctl --status-all;
8. How do exokernels differ?
a. Through libraries segregated by namespaces;
b. Through constructive simplicity;
c. By extended user privileges,
d. Through layers and CPIs;
e. By the size of the source code;
f. Through increased security;
g. By components and their location;
9. Is the highest security class A2?
a. FALSE
b. TRUE
10. Are the binaries used mainly by the root located in the / bin and / usr / bin directories?
a. FALSE
b. TRUE
11. Which operating system has security tags?
a. А1;
b. B1;
c. С2;
d. B3;
e. B2;
f. A2;
12. What partition is missing when installing the operating system under BIOS?
a. zfs;
b. ufs;
c. fat;
d. ext4;
e. esp:
f. swap;

13. Can't the physical link create a link to the directories?
a. FALSE
b. TRUE
14. What will the file extension have: "dd if = file. xxx of = devicename bs = 4M"?
a. exe;
b. img;
c. tar;
d. iso;
15. What action is not part of the rcd service manager?
a. disable;
b. run;
c. check;
d. reload;
e. stop;
f. enable;
16. What does the enable option do?
a. Temporarily starts the service and then shuts it down;
b. Start the service at the current boot;
c. Starts the boot service;
d. Starts the service and activates it in the crontab;
17. Specifies the correct method for the file to have the following rights: r - r-x-w-?
a. 742;
b. 463;
c. 452;
d. 215;
e. 136;
18. Specifies the correct method for the file to have the following rights: r-x-wx-w-?
a. 324;
b. 143;
c. 471;
d. 721;
e. 532;
19. Does it specify what process protection entails?
a. Use of certification methods;
b. Activating daemons,
c. Starting a pseudo-device;
d. Setting up a proxy server:
e. Using the 9 bits rwх;
f. Activating openssl;

20. Does it mean building security at OSI levels in the first place?
a. Starting an antivirus;
b. Formation of certification methods;
c. Installation of encryption applications;
d. Securing entity tables;
21. In which hierarchy are the user applications additionally installed placed?
a. 3;
b. 5;
c. 1;
d. 4;
e. 2;
22. Which file system has a tabular checksum?
a. ext3;
b. UFS;
c. NTFS;
d. JFS;
e. BtrFS;
f. ext4;
g. XFS;
h. ZFS;
i. ext2;
23. Specify which statement will stop a user's activity?
a. fork;
b. sleep;
c. block;
d. exec;
e. detach;
f. Notify;
g. add;
h. seek:
i. kill;
j. modify;
k. wait;
l. nice;
m. open;
n. attach;
o. delete;
p. kill;
q. exec;
r. notify;
s. add;

24. Specify which statement changes the priority of a process?
a. seek;
b. detach;
c. nice;
d. modify;
e. sleep;
f. delete;
g. exit;
h. write;
i. attach;
j. fork;
k. open;
l. read;
m. wait;
n. block;
o. close;
p. kill;
q. exec;
r. notify;
s. add;
25. Specify where the grub configuration files are located?
a. /var;
b. /etc;
c. / Usr / local / etc;
d. /boot;
26. Where are hybrid kernel modules stored?
a. In the processor paging registers;
b. In the segmentation registers of the processor;
c. In the address space of the kernel;
d. In the user's address space;
27. Which statement changes the importance of a process?
a. ps;
b. chmod;
c. nice;
a. Ismod;
28. The source of the source code whose operating system is considered pure but cannot have a POSIX standard?
a. MacOS;
b. Plan 9;
c. BSD UNIX;
d. UNIX OS;
e. SunOS;
f. Solaris;
g. Linux;
29. How will you stop the process permanently?
a. kill -15 pid;
b. kill -9 pid;
c. kill -17 pid;
d. kill pid;
e. kill -20 pid;

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 19:30
The following is an excerpt from a slide presentation. today we will inverse operations solving equations using inverse operations solving inequalities using inverse operations from which part of the presentation does the slide most likely come from? a. introduction b. outline c. body d. conclusion
Answers: 1
question
Computers and Technology, 24.06.2019 05:50
What all vehicles has tesla inc. created over the years
Answers: 3
question
Computers and Technology, 24.06.2019 10:20
Identify the publisher in this citation: carter,alan.a guide to entrepreneurship.new york: river’2008.print.
Answers: 3
question
Computers and Technology, 24.06.2019 12:00
How can we take picture in this app
Answers: 1
You know the right answer?
Hi, I need to answer the following questions related to cryptography, Linux and UNIX 1. Does it spe...
Questions
question
Mathematics, 13.10.2020 02:01
question
English, 13.10.2020 02:01
question
Social Studies, 13.10.2020 02:01
Questions on the website: 13722360