QUESTIONS WITH 100% CORRECT
ANSWERS
Modern storage systems, including hard drives and USB drives, suffer from several
types of fragmentation. Which of the following describe typical kinds of fragmentation?
Select all that apply.
Wasted clusters left in gaps between files on the drive
Wasted space between the end of a file and the end of a cluster
Delays caused by having a file stored in clusters spread across the drive
Wasted space because a volume partition is too small for a particular collection of files -
Answer- - Wasted space between the end of a file and the end of a cluster
- Delays caused by having a file stored in clusters spread across the drive
- Wasted space because a volume partition is too small for a particular collection of files
Bob is trying to hide some secret information by using an undersized file system to set
aside space for his secrets. Which of the following are true? Select all that apply.
The hidden storage uses extra space on the drive that is made available by special low-
level formatting.
The hidden storage uses space taken from the regular file system: The regular system
is told to only use part of the available space in the partition, and the remaining space is
used by the hidden data.
The hidden section uses storage that the operating system ignores, except when Bob
uses special software.
The hidden section may be wiped out accidentally if the normal operating system tries
to use too much space on the drive. - Answer- - The hidden storage uses space taken
from the regular file system: The regular system is told to only use part of the available
space in the partition, and the remaining space is used by the hidden data.
, - The hidden section uses storage that the operating system ignores, except when Bob
uses special software.
We have accidentally deleted an important file from the FAT file system. We wish to
undelete it. Which of the following statements about the undelete process are true?
Select all that apply.
We can always undelete a file from the FAT file system.
The deleted file's directory entry must still contain enough information for us to identify
the file.
We use the FAT to follow the deleted file's cluster chain.
The deleted file's directory entry must still contain the cluster number of the file's first
block.
All clusters in the deleted file must be stored sequentially. - Answer- - The deleted file's
directory entry must still contain enough information for us to identify the file.
- The deleted file's directory entry must still contain the cluster number of the file's first
block.
- All clusters in the deleted file must be stored sequentially.
We are trying to protect a household computer. We have implemented password-based
authentication to protect sensitive data. Which levels of attacker motivation can this
authentication typically protect against in this situation? Select all that apply.
Stealth motivation
No motivation
Medium motivation
Scant motivation - Answer- Stealth motivation
No motivation
Scant motivation
The following are fundamental strategies for authenticating people on computer
systems, except:
something you have.
something you are.
something you make.
something you know. - Answer- something you make