Mcs 022 Block 2 3 4 Exam Notes
Mcs 022 Block 2 3 4 Exam Notes
Mcs 022 Block 2 3 4 Exam Notes
responsible, as the name implies, for managing the memory in the system.
This includes implementation of virtual memory and demand paging,
memory allocation both for kernel internal structures and user space
programs, mapping of files into processes address space and many other
cool things. Linux memory management is a complex system with many
configurable settings.
Filter - Filters are programs that take plain text (either stored in a file or
produced by another program) as standard input, transforms it into a
meaningful format, and then returns it as standard output. Linux has a
number of filters.
6. Network vulnerabilities come in many forms but the most common types
are: Malware, short for malicious software, such as Trojans, viruses, and
worms that are installed on a user's machine or a host server. Social
engineering attacks that fool users into giving up personal information such
as a username or password.
A computer threat is a term that relates to the security of a computer system
being compromised. This threat can lead to cyber-attacks and data being
stolen, lost or edited. The threat could be caused by poor information security
practices or a 'backdoor' in the code of the system.