A scheduling algorithm can use either ___________ priority or ________ priority.
1.static, still
2.static, dynamic
3. live, dead
4. none of the mentioned
Posted Date:-2022-03-26 18:21:34
Delay and Jitter ________
1.mean the same thing
2.are two completely different things
3.all of the mentioned
4.none of the mentioned
Posted Date:-2022-03-26 18:13:29
From the following, which is not a common file permission?
1.Write
2.Execute
3. Stop
4.Read access geo redundant storage
Posted Date:-2022-03-26 18:47:10
In the TEARDOWN state ______
1. the server breaks down the connection and releases the resources allocated for the session
2.the client breaks down the connection and releases the resources allocated for the session
3. the system crashes
4. none of the mentioned
Posted Date:-2022-03-26 18:42:48
Lossy and lossless are classifications of _______
1.multimedia storage systems
2. files
3.compression algorithms
4.All of the Mentioned
Posted Date:-2022-03-26 18:06:34
Lossy techniques provide ___________ when compared to lossless techniques.
1. lower compression ratios
2.much higher compression ratios
3. similar compression ratios
4.None of the mentioned
Posted Date:-2022-03-26 18:07:01
RTP stands for ______
1.real time protocol
2.real time transmission control protocol
3.real time transmission protocol
4.real time transport protocol
Posted Date:-2022-03-26 18:43:15
The hybrid algorithm that combines EDF with SCAN algorithm is known as _______
1.EDS
2.SDF
3.SCAN-EDF
4.None of the mentioned
Posted Date:-2022-03-26 18:25:55
Which of the following is a strong password?
1.19thAugust88
2. Delhi88
3. P@assw0rd
4. !augustdelhi
Posted Date:-2022-03-26 18:50:13
An admission control scheme assigns a __________ to each type of resource.
1.processor
2.memory location
3.resource manager
4.All of the Mentioned
Posted Date:-2022-03-26 18:19:40
As disks have relatively low transfer rates and relatively high latency rates, disk schedulers must reduce latency times to ______
1.ensure high bandwidth
2.ensure low bandwidth
3.make sure data is transferred
4.reduce data transfer speeds
Posted Date:-2022-03-26 18:22:38
Broadcasting delivers the content to _____
1.a single client
2.all clients, regardless whether they want the content or not
3.a group of receivers who indicate they wish to receive the content
4.None of the mentioned
Posted Date:-2022-03-26 18:36:36
Compression ratio is the ratio of ______
1.the original file size to the size of the compressed file
2. the number of pixels in a frame of the original size to those in a frame of the compressed file
3.compressed file size to the original file size
4.None of the mentioned
Posted Date:-2022-03-26 18:06:13
HTTP is ______
1. a stateful protocol
2.a stateless protocol
3. a protocol that maintains the status of its connection with the client
4.a stateless protocol that does not maintain the status of its connection with the client
Posted Date:-2022-03-26 18:39:20
If several requests have different deadlines that are relatively close together, then using the SCAN – EDF algorithm ______
1.the SCAN ordering will service the requests in that batch
2. the EDF ordering will service the requests in that batch
3.the FCFS ordering will service the requests in that batch
4.None of the mentioned
Posted Date:-2022-03-26 18:29:09
In SCAN – EDF, requests with the same deadlines are ordered according to _______
1.SCAN policy
2. EDF policy
3.FCFS policy
4.FIFO policy
Posted Date:-2022-03-26 18:32:00
In the SETUP state ______
1.the server is setup
2. the client is setup
3.the server allocates resources for the client session
4. the client sends requests to the server
Posted Date:-2022-03-26 18:42:19
Multicasting delivers the content to _______
1. a single client
2. all clients, regardless whether they want the content or not
3.a group of receivers who indicate they wish to receive the content
4.None of the mentioned
Posted Date:-2022-03-26 18:37:00
Multimedia systems require _________ scheduling to ensure critical tasks will be serviced within timing deadlines.
1. soft real time
2. hard real time
3. normal
4.None of the mentioned
Posted Date:-2022-03-26 18:30:58
RTSP includes which of the following states?
1.SETUP
2.PLAY
3.PAUSE
4.All of the Mentioned
Posted Date:-2022-03-26 18:41:56
RTSP stands for ______
1.Real Time Streaming Policy
2.Real Time Streaming Protocol
3.Real Time Systems Protocol
4.Read Time Streaming Policy
Posted Date:-2022-03-26 18:38:17
Servicing requests strictly according to deadline using EDF may result in ____
1. lower seek times
2. lower bandwidth
3.higher seek time
4.higher bandwidth
Posted Date:-2022-03-26 18:23:22
The difficulty with multicasting from a practical point of view is ________
1.memory allocation is difficult
2.server must establish a separate unicast session for each client
3.the routers must support multicasting
4.None of the mentioned
Posted Date:-2022-03-26 18:44:03
The EDF scheduler uses ________ to order requests according to their deadlines.
1. stack
2. disks
3.queue
4.None of the mentioned
Posted Date:-2022-03-26 18:31:22
The level that treats different types of traffics in different ways, giving certain traffic streams higher priority than other streams and with best efforts, but no guarantees are made ______
1. Best effort service
2. Soft QoS
3.Worst effort service
4.Hard QoS
Posted Date:-2022-03-26 18:10:44
The problem with unicast delivery is that the ____
1.memory allocation is difficult
2.server must establish a separate unicast session for each client
3. the routers must support unicasting
4.the clients must be close to the server
Posted Date:-2022-03-26 18:43:40
The quality of service requirements are guaranteed in _______
1.Best effort service
2.Soft QoS
3.Worst effort service
4.Hard QoS
Posted Date:-2022-03-26 18:11:56
The three general methods for delivering content from a server to a client across a network are _______
1.unicasting
2.unicasting
3. broadcasting
4.All of the Mentioned
Posted Date:-2022-03-26 18:34:16
To let a client have random access to a media stream with ____
1.the protocol used must not be stateless
2.the server must support download
3.the stream should give access rights to the client
4.All of the Mentioned
Posted Date:-2022-03-26 18:44:31
Unicasting delivers the content to _____
1.a single client
2. all clients, regardless whether they want the content or not
3. a group of receivers who indicate they wish to receive the content
4.None of the mentioned
Posted Date:-2022-03-26 18:34:40
What are the characteristics of Authorization?
1.RADIUS and RSA
2.3 way handshaking with syn and fin
3.Multilayered protection for securing resources
4.Deals with privileges and rights
Posted Date:-2022-03-26 18:52:16
What are the common security threats?
1.File Shredding
2.File sharing and permission
3.File corrupting
4.File integrity
Posted Date:-2022-03-26 18:46:38
What are the factors that define QoS?
1.Throughput
2.Jitter
3.Delay
4.All of the Mentioned
Posted Date:-2022-03-26 18:12:40
What are the levels in QoS?
1.Best effort service
2.Soft QoS
3.Hard QoS
4.All of the Mentioned
Posted Date:-2022-03-26 18:09:52
What does Light Directory Access Protocol (LDAP) doesn’t store?
1.Users
2.Address
3.Passwords
4.Security Keys
Posted Date:-2022-03-26 18:50:57
What forces the user to change password at first login?
1.Default behavior of OS
2.Part of AES encryption practice
3. Devices being accessed forces the user
4. Account administrator
Posted Date:-2022-03-26 18:52:41
What is Admission control?
1.the delay that occurs during playback of the stream
2.the practice of admitting a request for service only if the server has sufficient resources to satisfy the request
3. how the errors are handled during the transmission and processing of continuous media
4.None of the mentioned
Posted Date:-2022-03-26 18:18:49
What is breach of confidentiality?
1.This type of violation involves unauthorized reading of data
2.This violation involves unauthorized modification of data
3.This violation involves unauthorized destruction of data
4.This violation involves unauthorized use of resources
Posted Date:-2022-03-26 18:54:21
What is characteristic of RADIUS system?
1.It is essential for centralized encryption and authentication
2. It works on Network layer to deny access to unauthorized people
3.It provides centralized authentication mechanism via network devices
4.It’s a strong File access system
Posted Date:-2022-03-26 18:51:21
What is MPEG compression?
1.stores the compression values of each frame
2.stores the differences between successive frames
3.stores multiple frames’ values together
4.None of the mentioned
Posted Date:-2022-03-26 18:09:03
What is not a best practice for password policy?
1.Deciding maximum age of password
2.Restriction on password reuse and history
3.Password encryption
4.Having change password every 2 years
Posted Date:-2022-03-26 18:53:05
What is not a good practice for user administration?
1. Isolating a system after a compromise
2.Perform random auditing procedures
3.Granting privileges on a per host basis
4.Using telnet and FTP for remote access
Posted Date:-2022-03-26 18:49:04
What is the breach of integrity?
1. This type of violation involves unauthorized reading of data
2.This violation involves unauthorized modification of data
3.This violation involves unauthorized destruction of data
4.This violation involves unauthorized use of resources
Posted Date:-2022-03-26 18:53:40
What is the Delay?
1. the time from when a request is first submitted to when the desired result is produced
2.the delay that occurs during playback of the stream
3.how the errors are handled during the transmission and processing of continuous media
4.None of the mentioned
Posted Date:-2022-03-26 18:14:25
What is the full form of MPEG?
1.Motion Pictures Engineering Group
2.Motion Picture Engineers Group
3.Motion Picture Experts Group
4.None of the mentioned
Posted Date:-2022-03-26 18:07:40
Which happens first authorization or authentication?
1. Authorization
2. Authentication
3.Authorization & Authentication are same
4.None of the mentioned
Posted Date:-2022-03-26 18:51:43
Which of the following are forms of malicious attack?
1.Theft of information
2.Modification of data
3.Wiping of information
4. All of the mentioned
Posted Date:-2022-03-26 18:46:09
Which of the following is a good practice?
1.Give full permission for remote transferring
2.Grant read only permission
3.Grant limited permission to specified account
4.Give both read and write permission but not execute
Posted Date:-2022-03-26 18:47:46
Which of the following is the least secure method of authentication?
1. Key card
2. fingerprint
3. retina pattern
4.Password
Posted Date:-2022-03-26 18:49:43
Why is one time password safe?
1. It is easy to generated
2.It cannot be shared
3. It is different for every access
4.It is a complex encrypted password
Posted Date:-2022-03-26 18:50:33