This section includes 7 InterviewSolutions, each offering curated multiple-choice questions to sharpen your Current Affairs knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
The solution to the problem of reliability is the introduction of __________(a) aging(b) scheduling(c) redundancy(d) disks |
|
Answer» Correct choice is (c) redundancy Easy explanation - None. |
|
| 2. |
What is the disk bandwidth?(a) the total number of bytes transferred(b) total time between the first request for service and the completion on the last transfer(c) the total number of bytes transferred divided by the total time between the first request for service and the completion on the last transfer(d) none of the mentioned |
|
Answer» The correct option is (c) the total number of bytes transferred divided by the total time between the first request for service and the completion on the last transfer The explanation is: None. |
|
| 3. |
____________ writes occur in the order in which the disk subsystem receives them, and the writes are not buffered.(a) Asynchronous(b) Regular(c) Synchronous(d) Irregular |
|
Answer» Right option is (c) Synchronous The explanation: None. |
|
| 4. |
The operating system keeps a small table containing information about all open files called ____________(a) system table(b) open-file table(c) file table(d) directory table |
|
Answer» The correct choice is (b) open-file table The explanation: None. |
|
| 5. |
The _______ program initializes all aspects of the system, from CPU registers to device controllers and the contents of main memory, and then starts the operating system.(a) main(b) bootloader(c) bootstrap(d) rom |
|
Answer» Right choice is (c) bootstrap The best I can explain: None. |
|
| 6. |
The phase change disk is coated with a material that can freeze into either _______ or ________ state.(a) crystalline, solid(b) ice, amorphous(c) crystalline, liquid(d) crystalline, amorphous |
|
Answer» The correct choice is (d) crystalline, amorphous Explanation: None. |
|
| 7. |
Increasing the RAM of a computer typically improves performance because ____________(a) Virtual memory increases(b) Larger RAMs are faster(c) Fewer page faults occur(d) None of the mentioned |
|
Answer» Correct answer is (c) Fewer page faults occur Explanation: None. |
|
| 8. |
Random access to tape is _______ a disk seek.(a) much slower than(b) much faster than(c) comparable to(d) none of the mentioned |
|
Answer» Correct option is (a) much slower than Explanation: None. |
|
| 9. |
A typical tape drive is ________ a typical disk drive.(a) more expensive than(b) cheaper than(c) of the same cost as(d) none of the mentioned |
|
Answer» Correct option is (a) more expensive than Explanation: None. |
|
| 10. |
The noise temperature at a resistor depends upon a. Resistance value b. Noise power c. Both a and b d. None of the above |
|
Answer» b. Noise power |
|
| 11. |
What is the host controller?(a) controller built at the end of each disk(b) controller at the computer end of the bus(c) all of the mentioned(d) none of the mentioned |
|
Answer» Right answer is (b) controller at the computer end of the bus Best explanation: None. |
|
| 12. |
Noise factor for a system is defined as the ratio of a. Input noise power (Pni) to output noise power (Pno) b. Output noise power (Pno) to input noise power (Pni) c. Output noise power (Pno) to input signal power (Psi) d. Output signal power (Pso) to input noise power (Pni) |
|
Answer» b. Output noise power (Pno) to input noise power (Pni) |
|
| 13. |
Which direction access cannot happen using DMZ zone by default?(a) Company computer to DMZ(b) Internet to DMZ(c) Internet to company computer(d) Company computer to internet |
|
Answer» The correct answer is (c) Internet to company computer The explanation is: Connection from internet is never allowed to directly access internal PCs but is routed through DMZ zone to prevent attacks. |
|
| 14. |
Noise Factor(F) and Noise Figure(NF) are related as a. NF = 10 log10(F) b. F = 10 log10(NF) c. NF = 10 (F) d. F = 10 (NF) |
|
Answer» a. NF = 10 log10(F) |
|
| 15. |
What are the two features of a tripwire file system?(a) It is a tool to monitor file systems(b) It is used to automatically take corrective action(c) It is used to secure UNIX system(d) None of the mentioned |
|
Answer» Correct option is (a) It is a tool to monitor file systems To explain: None. |
|
| 16. |
When hardware is accessed by reading and writing to the specific memory locations, then it is called ____________(a) port-mapped I/O(b) controller-mapped I/O(c) bus-mapped I/O(d) none of the mentioned |
|
Answer» The correct choice is (d) none of the mentioned The explanation is: It is called memory-mapped I/O. |
|
| 17. |
The data-in register of I/O port is ____________(a) Read by host to get input(b) Read by controller to get input(c) Written by host to send output(d) Written by host to start a command |
|
Answer» Correct answer is (a) Read by host to get input Explanation: None. |
|
| 18. |
The magneto-optic head flies ___________ the disk surface than a magnetic disk head does.(a) much farther from(b) much closer to(c) at the same distance as(d) none of the mentioned |
|
Answer» The correct option is (a) much farther from The explanation: None. |
|
| 19. |
Random access in magnetic tapes is _________ compared to magnetic disks.(a) fast(b) very fast(c) slow(d) very slow |
|
Answer» The correct choice is (d) very slow Best explanation: None. |
|
| 20. |
On media that use constant linear velocity (CLV), the _____________ is uniform.(a) density of bits on the disk(b) density of bits per sector(c) the density of bits per track(d) none of the mentioned |
|
Answer» Right choice is (c) the density of bits per track The explanation: The farther a track is from the center of the disk. |
|
| 21. |
How do viruses avoid basic pattern match of antivirus?(a) They are encrypted(b) They act with special permissions(c) They modify themselves(d) None of the mentioned |
|
Answer» Right option is (c) They modify themselves The best I can explain: None. |
|
| 22. |
How does an antivirus of today identify viruses?(a) Previously known patterns(b) It can detect unknown patterns(c) It can take high priority to increase scanning speed(d) None of the mentioned |
|
Answer» The correct option is (a) Previously known patterns Best explanation: None. |
|
| 23. |
What are the drawbacks of the host based IDS?(a) Unselective logging of messages may increase the audit burdens(b) Selective logging runs the risk of missed attacks(c) They are very fast to detect(d) They have to be programmed for new patterns |
|
Answer» Right answer is (a) Unselective logging of messages may increase the audit burdens Explanation: None. |
|
| 24. |
What are characteristics of stack based IDS?(a) They are integrated closely with the TCP/IP stack and watch packets(b) The host operating system logs in the audit information(c) It is programmed to interpret a certain series of packets(d) It models the normal usage of network as a noise characterization |
|
Answer» Right choice is (a) They are integrated closely with the TCP/IP stack and watch packets The explanation is: None. |
|
| 25. |
What are strengths of Network based IDS?(a) Cost of ownership reduced(b) Malicious intent detection(c) Real time detection and response(d) All of the mentioned |
|
Answer» Correct choice is (d) All of the mentioned To explain I would say: None. |
|
| 26. |
What is known as a sandbox?(a) It is a program which can be molded to do the desired task(b) It is a program that is controlled or emulated section of OS(c) It is a special mode of antivirus(d) None of the mentioned |
|
Answer» Correct option is (b) It is a program that is controlled or emulated section of OS The explanation is: None. |
|
| 27. |
Noise is added to a signal in a communication system a. At the receiving end b. At transmitting antenna c. In the channel d. During regeneration of the information |
|
Answer» c. In the channel |
|
| 28. |
Noise power at the resistor is affected by the value of the resistor as a. Directly proportional to the value of the resistor b. Inversely proportional to the value of the resistor c. Unaffected by the value of the resistor d. Becomes half as the resistance value isdoubled |
|
Answer» C will be the correct answer because The Noise power is given by Pn = KTB Where K = 1.381 × 10-23 J/K, joules per Kelvin, the Boltzmann constant B is the bandwidth at which the power Pn is delivered. T noise temperature, which is unaffected by change in the value of the resistor. c. Unaffected by the value of the resistor |
|
| 29. |
What is are two safe computing practices?(a) Not to open software from unknown vendors(b) Open and execute programs in admin level/root(c) Open and execute programs in presence of antivirus(d) None of the mentioned |
|
Answer» Right choice is (a) Not to open software from unknown vendors The best I can explain: Disgruntled employees have in past infected the master copies of software programs to do economic harm to the company. |
|
| 30. |
What are the drawbacks of signature based IDS?(a) They are unable to detect novel attacks(b) They suffer from false alarms(c) They have to be programmed again for every new pattern to be detected(d) All of the mentioned |
|
Answer» Correct choice is (d) All of the mentioned The best explanation: None. |
|
| 31. |
What are the different ways to intrude?(a) Buffer overflows(b) Unexpected combinations and unhandled input(c) Race conditions(d) All of the mentioned |
|
Answer» Right option is (d) All of the mentioned The best explanation: None. |
|
| 32. |
What are the major components of the intrusion detection system?(a) Analysis Engine(b) Event provider(c) Alert Database(d) All of the mentioned |
|
Answer» Right answer is (d) All of the mentioned Explanation: None. |
|
| 33. |
Notch filter is a a. Band pass filter b. Band stop filter c. Low pass filter d. High pass filter |
|
Answer» b. Band stop filter |
|
| 34. |
Error handler codes, to handle unusual errors are ____________(a) almost never executed(b) executed very often(c) executed periodically(d) none of the mentioned |
|
Answer» The correct answer is (a) almost never executed Best explanation: None. |
|
| 35. |
The VFS (virtual file system) activates file system specific operations to handle local requests according to their _______(a) size(b) commands(c) timings(d) file system types |
|
Answer» The correct choice is (d) file system types The best I can explain: None. |
|
| 36. |
In virtual memory. the programmer __________ of overlays.(a) has to take care(b) does not have to take care(c) all of the mentioned(d) none of the mentioned |
|
Answer» Correct answer is (b) does not have to take care The explanation is: None. |
|
| 37. |
What are the different ways to classify an IDS?(a) anomaly detection(b) signature based misuse(c) stack based(d) all of the mentioned |
|
Answer» The correct option is (d) all of the mentioned To explain: None. |
|
| 38. |
What is the major drawback of anomaly detection IDS?(a) These are very slow at detection(b) It generates many false alarms(c) It doesn’t detect novel attacks(d) None of the mentioned |
|
Answer» Correct option is (b) It generates many false alarms Best explanation: None. |
|
| 39. |
What are the different ways to classify an IDS?(a) Zone based(b) Host & Network based(c) Network & Zone based(d) Level based |
|
Answer» The correct option is (b) Host & Network based Best explanation: None. |
|
| 40. |
Virtual memory is normally implemented by ________(a) demand paging(b) buses(c) virtualization(d) all of the mentioned |
|
Answer» Correct choice is (a) demand paging The explanation is: None. |
|
| 41. |
Working set model for page replacement is based on the assumption of ____________(a) modularity(b) locality(c) globalization(d) random access |
|
Answer» Correct option is (b) locality The explanation is: None. |
|
| 42. |
An unrecoverable error is known as _________(a) hard error(b) tough error(c) soft error(d) none of the mentioned |
|
Answer» Correct choice is (a) hard error Explanation: None. |
|
| 43. |
Using swap space significantly _________ system performance.(a) increases(b) decreases(c) maintains(d) does not affect |
|
Answer» Correct answer is (b) decreases Explanation: Disk access is much slower than memory access. |
|
| 44. |
What are the examples of state information?(a) opened files and their clients(b) file descriptors and file handles(c) current file position pointers(d) all of the mentioned |
|
Answer» The correct choice is (d) all of the mentioned Explanation: None. |
|
| 45. |
What is the advantage of caching in remote file access?(a) Reduced network traffic by retaining recently accessed disk blocks(b) Faster network access(c) Copies of data creates backup automatically(d) None of the mentioned |
|
Answer» Right choice is (a) Reduced network traffic by retaining recently accessed disk blocks Best explanation: None. |
|
| 46. |
What is the idea behind thread pools?(a) a number of threads are created at process startup and placed in a pool where they sit and wait for work(b) when a process begins, a pool of threads is chosen from the many existing and each thread is allotted equal amount of work(c) all threads in a pool distribute the task equally among themselves(d) none of the mentioned |
|
Answer» Right answer is (a) a number of threads are created at process startup and placed in a pool where they sit and wait for work For explanation: None. |
|
| 47. |
Thread pools help in ____________(a) servicing multiple requests using one thread(b) servicing a single request using multiple threads from the pool(c) faster servicing of requests with an existing thread rather than waiting to create a new thread(d) none of the mentioned |
|
Answer» The correct option is (c) faster servicing of requests with an existing thread rather than waiting to create a new thread Best explanation: None. |
|
| 48. |
Which of the following is FALSE?(a) Context switch time is longer for kernel level threads than for user level threads(b) User level threads do not need any hardware support(c) Related kernel level threads can be scheduled on different processors in a multiprocessor system(d) Blocking one kernel level thread blocks all other related threads |
|
Answer» Right option is (d) Blocking one kernel level thread blocks all other related threads Easiest explanation - None. |
|
| 49. |
In the Many to One model, if a thread makes a blocking system call ___________(a) the entire process will be blocked(b) a part of the process will stay blocked, with the rest running(c) the entire process will run(d) none of the mentioned |
|
Answer» Right answer is (a) the entire process will be blocked To explain: None. |
|
| 50. |
In the Many to One model, multiple threads are unable to run in parallel on multiprocessors because of ___________(a) only one thread can access the kernel at a time(b) many user threads have access to just one kernel thread(c) there is only one kernel thread(d) none of the mentioned |
|
Answer» The correct answer is (a) only one thread can access the kernel at a time To explain: None. |
|