In: Computer Science
① Protection is strictly an internal problem. (1 word), on the other hand, requires not only an adequate protection system but also consideration of the external environment within which the system operates.
② A (1 word) is a computer, appliance, or router that sits between the two security domains and monitors and logs all connections. It can also limit connections based on source or destination address, source or destination port, or direction of the connection.
③ In the (1 word) algorithm, the disk arm starts at one end of the disk and moves toward the other end, servicing requests as it reaches each cylinder, until it gets to the other end of the disk. At the other end, the direction of head movement is reversed, and servicing continues.
④ A file-control block (FCB) (an (1 word) in most UNIX file systems) contains information about the file, including ownership, permissions, and location of the file contents.
Question 1:
Protection is strictly an internal problem. _______, on the other
hand, requires not only an adequate protection system but also the
consideration of the external environment within which the system
operates.
Ans: Security
Question 2:
__________ is a computer, appliance, or router that sits between
the two security domains and monitors and logs all connections. It
can also limit connections based on source or destination address,
source or destination port, or direction of the connection.
Ans: Firewall
Question 3:
In the ______ algorithm, the disk arm starts at one end of the disk
and moves toward the other end, servicing requests as it reaches
each cylinder until it gets to the other end of the disk. At the
other end, the direction of the head movement is reversed, and
servicing continues.
Ans: Scan
Question 4:
A file-control block
(FCB) contains information about the file, including
ownership, permissions, and location of the file contents.
For the 4th question, the File-control block is the answer which you mentioned is exactly right for sure.