Operating System (3140702) MCQs

MCQs of Security & Protection

Showing 21 to 30 out of 33 Questions
21.
Which of the following is/are Design Principles of Security?
(a) Principles of least privileges
(b) Principles of separation of privileges
(c) Principles of least common mechanism
(d) All of the mentioned
Answer:

Option (d)

22.
Which Design Principles of Security states that unless the subject is given explicit access to the object it should be denied access to that object?
(a) Principles of least privileges
(b) Principles of separation of privileges
(c) Principles of least common mechanism
(d) Principles of fail safe defaults
Answer:

Option (d)

23.
Which Design Principles of Security states that subject should be given only those privileges that it requires?
(a) Principles of least privileges
(b) Principles of separation of privileges
(c) Principles of least common mechanism
(d) Principles of fail safe defaults
Answer:

Option (a)

24.
Which Design Principles of Security states that all the accesses to object be checked in order to ensure that they are allowed?
(a) Principles of least privileges
(b) Principles of separation of privileges
(c) Principles of complete mediation
(d) Principles of fail safe defaults
Answer:

Option (c)

25.
What forces the user to change password at first logon ?
(a) Default behavior of OS
(b) Part of AES encryption practice
(c) Devices being accessed forces the user
(d) Account administrator
Answer:

Option (d)

26.
What is trap door?
(a) It is a secret entry point into a program
(b) It is a hole in software left by designer
(c) Both A and B
(d) None of the mentioned
Answer:

Option (c)

27.
Which one is not an antivirus?
(a) Norton
(b) Quick Heal
(c) AVG
(d) MS Office
Answer:

Option (d)

28.
______________ software is a type of program designed and developed to protect computers from malware like viruses, computer worms, spyware etc.
(a) System
(b) Antivirus
(c) Fighter
(d) Preventer
Answer:

Option (b)

29.
The functions of Antivirus programs is/are _________
(a) scan the system
(b) detect viruses
(c) remove viruses
(d) All of the mentioned
Answer:

Option (d)

30.
_____________ confirms your identity to grant access to the system.
(a) Authentication
(b) Authorization
(c) Encryption
(d) None of the mentioned
Answer:

Option (a)

Showing 21 to 30 out of 33 Questions