Which of the following computer design approaches is based on the fact that in earlier technologies, the instruction fetch was the longest part of the cycle?
Which of the following computer design approaches is based on the fact that in earlier technologies, the instruction fetch was the longest part of the cycle?A . PipeliningB . Reduced Instruction Set Computers (RISC)C . Complex Instruction Set Computers (CISC)D . Scalar processorsView AnswerAnswer: C Explanation: Complex Instruction Set Computer...
Which of the following addresses a portion of the primary memory by specifying the actual address of the memory location?
Which of the following addresses a portion of the primary memory by specifying the actual address of the memory location?A . direct addressingB . Indirect addressingC . implied addressingD . indexed addressingView AnswerAnswer: A Explanation: Absolute/Direct +------+-----+--------------------------------------+ | load | reg | address | +------+-----+--------------------------------------+ (Effective address = address as...
Which of the following embodies all the detailed actions that personnel are required to follow?
Which of the following embodies all the detailed actions that personnel are required to follow?A . StandardsB . GuidelinesC . ProceduresD . BaselinesView AnswerAnswer: C Explanation: Procedures are step-by-step instructions in support of of the policies, standards, guidelines and baselines. The procedure indicates how the policy will be implemented and who...
Who is ultimately responsible for the security of computer based information systems within an organization?
Who is ultimately responsible for the security of computer based information systems within an organization?A . The tech support teamB . The Operation Team.C . The management team.D . The training team.View AnswerAnswer: C Explanation: If there is no support by management to implement, execute, and enforce security policies and procedure,...
One of these statements about the key elements of a good configuration process is NOT true
One of these statements about the key elements of a good configuration process is NOT trueA . Accommodate the reuse of proven standards and best practicesB . Ensure that all requirements remain clear, concise, and validC . Control modifications to system hardware in order to prevent resource changesD . Ensure...
Pin, Password, Passphrases, Tokens, smart cards, and biometric devices are all items that can be used for Authentication. When one of these item listed above in conjunction with a second factor to validate authentication, it provides robust authentication of the individual by practicing which of the following?
Pin, Password, Passphrases, Tokens, smart cards, and biometric devices are all items that can be used for Authentication. When one of these item listed above in conjunction with a second factor to validate authentication, it provides robust authentication of the individual by practicing which of the following?A . Multi-party authenticationB...
What is Kerberos?
What is Kerberos?A . A three-headed dog from the egyptian mythology.B . A trusted third-party authentication protocol.C . A security model.D . A remote authentication dial in user server. View AnswerAnswer: B Explanation: Is correct because that is exactly what Kerberos is. The following answers are incorrect: A three-headed dog from Egyptian...
Which of the following statements pertaining to RADIUS is incorrect:
Which of the following statements pertaining to RADIUS is incorrect:A . A RADIUS server can act as a proxy server, forwarding client requests to other authentication domains.B . Most of RADIUS clients have a capability to query secondary RADIUS servers for redundancy.C . Most RADIUS servers have built-in database connectivity...
Which of the following is NOT a type of motion detector?
Which of the following is NOT a type of motion detector?A . Photoelectric sensorB . Passive infrared sensorsC . Microwave Sensor.D . Ultrasonic Sensor.View AnswerAnswer: A Explanation: A photoelectric sensor does not "directly" sense motion there is a narrow beam that won't set off the sensor unless the beam is broken....
What can best be described as an abstract machine which must mediate all access to subjects to objects?
What can best be described as an abstract machine which must mediate all access to subjects to objects?A . A security domainB . The reference monitorC . The security kernelD . The security perimeterView AnswerAnswer: B Explanation: The reference monitor is an abstract machine which must mediate all access to...