Operating System MCQ - Security
Security MCQs : This section focuses on "Security" in Operating System. These Multiple Choice Questions (MCQ) should be practiced to improve the Operating System skills required for various interviews (campus interview, walk-in interview, company interview), placements, entrance exams and other competitive examinations.
1. _______ refers to identifying each user of the system and associating the executing programs with those users.
A. One Time passwords
B. Authentication
C. Program Threats
D. Security
View Answer
Ans : B
Explanation: Authentication refers to identifying each user of the system and associating the executing programs with those users.
2. In how many ways, Operating Systems generally identifies/authenticates users using ?
A. 2
B. 3
C. 4
D. 5
View Answer
Ans : B
Explanation: Operating Systems generally identifies/authenticates users using following three ways : Username / Password, User card/key and User attribute.
3. ______ is a situation when a program misbehaves only when certain conditions met otherwise it works as a genuine program.
A. Trojan Horse
B. Trap Door
C. Logic bomb
D. Virus
View Answer
Ans : C
Explanation: Logic Bomb : Logic bomb is a situation when a program misbehaves only when certain conditions met otherwise it works as a genuine program. It is harder to detect.
4. Which of the following program threat, "Such program traps user login credentials and stores them to send to malicious user who can later on login to computer and can access system resources."
A. Trojan Horse
B. Trap Door
C. Logic bomb
D. Virus
View Answer
Ans : A
Explanation: Trojan Horse : Such program traps user login credentials and stores them to send to malicious user who can later on login to computer and can access system resources.
5. How many Computer Security Classifications are there?
A. 2
B. 3
C. 4
D. 5
View Answer
Ans : C
Explanation: As per the U.S. Department of Defense Trusted Computer System's Evaluation Criteria there are four security classifications in computer systems: A, B, C, and D.
6. Which of the following type is at Lowest level?
A. Type A
B. Type B
C. Type C
D. Type D
View Answer
Ans : D
Explanation: Type D : Lowest level. Minimum protection. MS-DOS, Window 3.1 fall in this category.
7. Which of the following type provides protection and user accountability using audit capabilities?
A. Type A
B. Type B
C. Type C
D. Type D
View Answer
Ans : C
Explanation: Type C : Provides protection and user accountability using audit capabilities.
8. Which of the following is not a stream cipher?
A. TBONE
B. RC5
C. RC4
D. Two fish
View Answer
Ans : A
Explanation: TBONE is not a stream cipher.
9. How do viruses avoid basic pattern match of antivirus?
A. They are encrypted
B. They modify themselves
C. They act with special permissions
D. None of the above
View Answer
Ans : B
Explanation: viruses avoid basic pattern match of antivirus : They modify themselves
10. What are the major components of the intrusion detection system?
A. Analysis Engine
B. Event provider
C. Alert Database
D. All of the above
View Answer
Ans : D
Explanation: All of the above are the major components of the intrusion detection system.
Discussion