A scheduling algorithm can use either ___________ priority or ________ priority.
1.static, still
2.static, dynamic
3. live, dead
4. none of the mentioned
Delay and Jitter ________
1.mean the same thing
2.are two completely different things
3.all of the mentioned
4.none of the mentioned
From the following, which is not a common file permission?
1.Write
2.Execute
3. Stop
4.Read access geo redundant storage
In the TEARDOWN state ______
1. the server breaks down the connection and releases the resources allocated for the session
2.the client breaks down the connection and releases the resources allocated for the session
3. the system crashes
4. none of the mentioned
Lossy and lossless are classifications of _______
1.multimedia storage systems
2. files
3.compression algorithms
4.All of the Mentioned
Lossy techniques provide ___________ when compared to lossless techniques.
1. lower compression ratios
2.much higher compression ratios
3. similar compression ratios
4.None of the mentioned
RTP stands for ______
1.real time protocol
2.real time transmission control protocol
3.real time transmission protocol
4.real time transport protocol
The hybrid algorithm that combines EDF with SCAN algorithm is known as _______
1.EDS
2.SDF
3.SCAN-EDF
4.None of the mentioned
Which of the following is a strong password?
1.19thAugust88
2. Delhi88
3. P@assw0rd
4. !augustdelhi
An admission control scheme assigns a __________ to each type of resource.
1.processor
2.memory location
3.resource manager
4.All of the Mentioned
As disks have relatively low transfer rates and relatively high latency rates, disk schedulers must reduce latency times to ______
1.ensure high bandwidth
2.ensure low bandwidth
3.make sure data is transferred
4.reduce data transfer speeds
Broadcasting delivers the content to _____
1.a single client
2.all clients, regardless whether they want the content or not
3.a group of receivers who indicate they wish to receive the content
4.None of the mentioned
Compression ratio is the ratio of ______
1.the original file size to the size of the compressed file
2. the number of pixels in a frame of the original size to those in a frame of the compressed file
3.compressed file size to the original file size
4.None of the mentioned
HTTP is ______
1. a stateful protocol
2.a stateless protocol
3. a protocol that maintains the status of its connection with the client
4.a stateless protocol that does not maintain the status of its connection with the client
If several requests have different deadlines that are relatively close together, then using the SCAN – EDF algorithm ______
1.the SCAN ordering will service the requests in that batch
2. the EDF ordering will service the requests in that batch
3.the FCFS ordering will service the requests in that batch
4.None of the mentioned
In SCAN – EDF, requests with the same deadlines are ordered according to _______
1.SCAN policy
2. EDF policy
3.FCFS policy
4.FIFO policy
In the SETUP state ______
1.the server is setup
2. the client is setup
3.the server allocates resources for the client session
4. the client sends requests to the server
Multicasting delivers the content to _______
1. a single client
2. all clients, regardless whether they want the content or not
3.a group of receivers who indicate they wish to receive the content
4.None of the mentioned
Multimedia systems require _________ scheduling to ensure critical tasks will be serviced within timing deadlines.
1. soft real time
2. hard real time
3. normal
4.None of the mentioned
RTSP includes which of the following states?
1.SETUP
2.PLAY
3.PAUSE
4.All of the Mentioned
RTSP stands for ______
1.Real Time Streaming Policy
2.Real Time Streaming Protocol
3.Real Time Systems Protocol
4.Read Time Streaming Policy
Servicing requests strictly according to deadline using EDF may result in ____
1. lower seek times
2. lower bandwidth
3.higher seek time
4.higher bandwidth
The difficulty with multicasting from a practical point of view is ________
1.memory allocation is difficult
2.server must establish a separate unicast session for each client
3.the routers must support multicasting
4.None of the mentioned
The EDF scheduler uses ________ to order requests according to their deadlines.
1. stack
2. disks
3.queue
4.None of the mentioned
The level that treats different types of traffics in different ways, giving certain traffic streams higher priority than other streams and with best efforts, but no guarantees are made ______
1. Best effort service
2. Soft QoS
3.Worst effort service
4.Hard QoS
The problem with unicast delivery is that the ____
1.memory allocation is difficult
2.server must establish a separate unicast session for each client
3. the routers must support unicasting
4.the clients must be close to the server
The quality of service requirements are guaranteed in _______
1.Best effort service
2.Soft QoS
3.Worst effort service
4.Hard QoS
The three general methods for delivering content from a server to a client across a network are _______
1.unicasting
2.unicasting
3. broadcasting
4.All of the Mentioned
To let a client have random access to a media stream with ____
1.the protocol used must not be stateless
2.the server must support download
3.the stream should give access rights to the client
4.All of the Mentioned
Unicasting delivers the content to _____
1.a single client
2. all clients, regardless whether they want the content or not
3. a group of receivers who indicate they wish to receive the content
4.None of the mentioned
What are the characteristics of Authorization?
1.RADIUS and RSA
2.3 way handshaking with syn and fin
3.Multilayered protection for securing resources
4.Deals with privileges and rights
What are the common security threats?
1.File Shredding
2.File sharing and permission
3.File corrupting
4.File integrity
What are the factors that define QoS?
1.Throughput
2.Jitter
3.Delay
4.All of the Mentioned
What are the levels in QoS?
1.Best effort service
2.Soft QoS
3.Hard QoS
4.All of the Mentioned
What does Light Directory Access Protocol (LDAP) doesn’t store?
1.Users
2.Address
3.Passwords
4.Security Keys
What forces the user to change password at first login?
1.Default behavior of OS
2.Part of AES encryption practice
3. Devices being accessed forces the user
4. Account administrator
What is Admission control?
1.the delay that occurs during playback of the stream
2.the practice of admitting a request for service only if the server has sufficient resources to satisfy the request
3. how the errors are handled during the transmission and processing of continuous media
4.None of the mentioned
What is breach of confidentiality?
1.This type of violation involves unauthorized reading of data
2.This violation involves unauthorized modification of data
3.This violation involves unauthorized destruction of data
4.This violation involves unauthorized use of resources
What is characteristic of RADIUS system?
1.It is essential for centralized encryption and authentication
2. It works on Network layer to deny access to unauthorized people
3.It provides centralized authentication mechanism via network devices
4.It’s a strong File access system
What is MPEG compression?
1.stores the compression values of each frame
2.stores the differences between successive frames
3.stores multiple frames’ values together
4.None of the mentioned
What is not a best practice for password policy?
1.Deciding maximum age of password
2.Restriction on password reuse and history
3.Password encryption
4.Having change password every 2 years
What is not a good practice for user administration?
1. Isolating a system after a compromise
2.Perform random auditing procedures
3.Granting privileges on a per host basis
4.Using telnet and FTP for remote access
What is the breach of integrity?
1. This type of violation involves unauthorized reading of data
2.This violation involves unauthorized modification of data
3.This violation involves unauthorized destruction of data
4.This violation involves unauthorized use of resources
What is the Delay?
1. the time from when a request is first submitted to when the desired result is produced
2.the delay that occurs during playback of the stream
3.how the errors are handled during the transmission and processing of continuous media
4.None of the mentioned
What is the full form of MPEG?
1.Motion Pictures Engineering Group
2.Motion Picture Engineers Group
3.Motion Picture Experts Group
4.None of the mentioned
Which happens first authorization or authentication?
1. Authorization
2. Authentication
3.Authorization & Authentication are same
4.None of the mentioned
Which of the following are forms of malicious attack?
1.Theft of information
2.Modification of data
3.Wiping of information
4. All of the mentioned
Which of the following is a good practice?
1.Give full permission for remote transferring
2.Grant read only permission
3.Grant limited permission to specified account
4.Give both read and write permission but not execute
Which of the following is the least secure method of authentication?
1. Key card
2. fingerprint
3. retina pattern
4.Password
Why is one time password safe?
1. It is easy to generated
2.It cannot be shared
3. It is different for every access
4.It is a complex encrypted password