Systems Architecture Study Set 1

Computing

Quiz 14 :

System Administration

Quiz 14 :

System Administration

Question Type
search
arrow
Describe the pros and cons of enabling auditing of resource accesses.
Free
Essay
Answer:

Answer:

Auditing of Resource accesses
• Records of user activity and resource access are created and managed using auditing. The records created and managed provide information that reveals whether security policies have been successfully implemented.
• The benefit of auditing is its usefulness for enforcing security policy. Audits are performed by analyzing past and future possibilities of security breaches.
The limitations of auditing are as follows:
• Growth of log files can be fast enough.
• It can reduce system performance as log entries are maintained simultaneously.
• Automated tools are required to extract useful data from large logs.

Tags
Choose question tag
close menu
arrow
What password-protection measures are normally implemented by system administrators, operating systems, and security services?
Free
Essay
Answer:

Answer:

Password-protection measures
Files that contain passwords as well as the passwords in transit that is for authentication are encrypted for security.
Few password protection measures that can be implemented by system administrators are given below:
• Specify restrictions : Various restrictions can be imposed on the choice of passwords such as the minimum and maximum length as well as the complexity of the passwords.
• Age of password : Users can be asked to change their passwords after certain duration of time.
• Account lockout : The account for a user can be locked after a specific number of incorrect tries. This prevents unauthorized users or programs to guess the password for an account.

Tags
Choose question tag
close menu
arrow
_________________ is a program or program fragment that infects a computer by installing itself permanently, performing one or more malicious acts, and replicating and spreading itself by using services of the infected computer.
Free
Essay
Answer:

Answer:

Virus
A(n) virus is a program or program fragment that infects a computer by installing itself permanently, performing one or more malicious acts, and replicating and spreading itself by using services of the infected computer.
A virus is a software program capable of installing itself and replicating to perform malicious acts such as destroying files.

Tags
Choose question tag
close menu
arrow
Some manufacturers and vendors of large midrange computers and mainframes have developed documentation and software to help engineers, account representatives, and purchasers configure computer hardware and system software. Some software can help users match software demands against the capabilities of particular hardware configurations. Investigate the online offerings of a few large computer vendors, such as www.ibm.com , www.hp.com , and www.fujitsu.com.
Essay
Answer:
Tags
Choose question tag
close menu
arrow
_______________is the process of determining whether an authenticated user or process has enough rights to access a resource.
Essay
Answer:
Tags
Choose question tag
close menu
arrow
What is infrastructure? In what ways do hardware and system software qualify as infrastructure?
Essay
Answer:
Tags
Choose question tag
close menu
arrow
Investigate firewall products from a major computer vendor, such as www.checkpoint.com, www.cisco.com , or www.netgear.com. Which products are best suited to a small LAN with no publicly accessible resources? Which are best suited to a small LAN containing one publicly accessible Web site? Which are best suited to large organizations with e-commerce Web sites and internal resources accessed by strategic partners?
Essay
Answer:
Tags
Choose question tag
close menu
arrow
____________ is the process of determining or verifying the identity of a user or process owner.
Essay
Answer:
Tags
Choose question tag
close menu
arrow
Locate one or more benchmarking programs for PCs on the Web. Download and install the benchmarks and test your own computer s performance. What do the results tell you about your computer? Do they offer any guidance for improving system performance? What types of application tasks do the benchmark programs simulate? Would similar benchmark programs be useful with midrange computers or mainframes?
Essay
Answer:
Tags
Choose question tag
close menu
arrow
What is a request for proposal (RFP)? How are responses to an RFP evaluated?
Essay
Answer:
Tags
Choose question tag
close menu
arrow
________________ is a formal (legal) document that solicits bids from hardware and software vendors.
Essay
Answer:
Tags
Choose question tag
close menu
arrow
What is a monitor? List types of monitors and the information they provide.
Essay
Answer:
Tags
Choose question tag
close menu
arrow
______________are expected to provide service over a period of years.
Essay
Answer:
Tags
Choose question tag
close menu
arrow
What basic strategic planning questions should be addressed for infrastructure?
Essay
Answer:
Tags
Choose question tag
close menu
arrow
____________ accepts service requests from an untrusted network and relays the requests to the appropriate servers.
Essay
Answer:
Tags
Choose question tag
close menu
arrow
Describe authentication and authorization. Which depends on the other? How and why are these processes more complex in a networked organization than in an organization that supports all information processing with a single mainframe?
Essay
Answer:
Tags
Choose question tag
close menu
arrow
The term___________ usually refers only to creating and managing records of user activity or resource access.
Essay
Answer:
Tags
Choose question tag
close menu
arrow
What are the advantages and disadvantages of standardization in hardware and system software?
Essay
Answer:
Tags
Choose question tag
close menu
arrow
What problems are encountered when attempting to determine hardware and system software requirements for application software that hasn t been developed yet?
Essay
Answer:
Tags
Choose question tag
close menu
arrow
Because IS resources can be considered _____________, service standards and costs for operation, maintenance, and improvement are important components of the IS strategic plan.
Essay
Answer:
Tags
Choose question tag
close menu
Showing 1 - 20 of 33