Computer Security Quiz Questions and Answers - 2

Question: 6

Multiple processor configurations

(A) Are very efficient, but only on some applications

(B) Work equally well on all applications

(C) Are less efficient than scalar configurations

(D) Are more efficient than scalar configurations

Ans: A

Are very efficient, but only on some applications

Question: 7

Applications

(A) Must usually be re-complied to use multiple processors

(B) Can always be made efficient on multiple processors

(C) Immediately run on multiple processors

(D) Cannot run on multiple processors

Ans: A

Must usually be re-complied to use multiple processors

Question: 8

Seeks analysis is

(A) Only shown on real-time displays

(B) Used for analyzing control-unit busy problems

(C) Used for analyzing device busy problems

(D) Used for analyzing paging problems

Ans: C

Used for analyzing device busy problems

Question: 9

The most common security failure is

(A) Depending on passwords

(B) Carelessness by users

(C) Too much emphasis on preventing physical access

(D) Insufficient technology used to prevent breaches

Ans: D

Insufficient technology used to prevent breaches

Question: 10

Trojan-Horse programs

(A) Usually are immediately discovered

(B) Really do not usually work

(C) Are hacker programs that do not show up on the system

(D) Are legitimate programs that allow unauthorized access

Ans: D

Are legitimate programs that allow unauthorized access

Related Questions