Questions
- The architecture for a secure network has several stakeholders. These include who?
A. Company suppliers
B. System operators
C. Software developers
D. Anyone concerned with the functionality or usability of the system
- Computers add multiple CPUs to improve performance. These systems are called what?
A. Multiprocessing computers
B. Multi-CPU computers
C. Multithreaded computers
D. Multiheaded computers
- After powering on a computer, it eventually boots the Linux operating system. Which of the following loads the kernel?
A. BIOS
B. MBR
C. UEFI
D. USER
- A device that resides on computer motherboards to manage cryptographic keys and passwords is called what?
A. MBR
B. HSM
C. TCG
D. TPM
- The primary difference between RAM and ROM is what?
A. RAM data cannot be altered; ROM data can be altered.
B. RAM loses data when powered off; ROM retains data when powered off.
C. RAM has stored programs pre-loaded onto it; ROM comes stripped of programs.
D. RAM retains data when powered off; ROM...