Listed below are general rules that help establish a suitabl…

Listed below are general rules that help establish a suitable testing environment for the test taker and for the proctor. Testing environment: A desk area that is free of papers and clutter. Uniform lighting and avoidance of strong lighting (electric light or sunlit window) in the direction the camera is pointing. Test Taker No headphones or ear plugs. No cell phones, tablets, or unauthorized materials (blank scratch paper is OK) No head gear or hair that obscures the eyes. No sound from radio or TV during the exam. No other persons in the room.  Question: Which of the following situations provides the best testing environment for both the test taker and the proctor?

Which of the following would result from doubling the block…

Which of the following would result from doubling the block size in a multilevel indexed filesystem, assuming no other changes? Doubling of maximum file size.[1]  Decrease the average read/write time on spinning disks.[2]  Increased space efficiency / utilization.[3]  Doubling of maximum filesystem size.[4] 

Which of these requires citation of sources for work (e.g.,…

Which of these requires citation of sources for work (e.g., writing or code)? Work is copied from another source [1] Work is inspired by another source [2] I copied part of work from a previous submission / publication [3] I am inspired by my previous submission / publication [4]

Select True or False for the following statements An access…

Select True or False for the following statements An access control matrix that consists of a large number of groups, and objects will take up more storage space than an access control list of the same number of groups, and objects.[1] A user at security level 2 using the Bell-Lapadula model can only read objects at level 2.[2] In asymmetric secret-key cryptography, the encryption key is always announced publicly.[3]

Which of the following statements are correct with respect t…

Which of the following statements are correct with respect to segmentation? I. Total address space can’t exceed the size of physical memory [options] II. There is a single linear address space [options2] III. Procedures and data can be distinguished and separately protected with this scheme [options3] IV. Segmentation is rarely used now. Paging is a more common approach.[options4]