Operating System (3140702) MCQs

MCQs of Security & Protection

Showing 11 to 20 out of 33 Questions
11.
What is a trap door in a program?
(a) A type of antivirus
(b) Security hole in a network
(c) A security hole, inserted at programming time in the system for later use
(d) None of the mentioned
Answer:

Option (c)

12.
File virus attaches itself to the _____________
(a) source file
(b) object file
(c) executable file
(d) All of the mentioned
Answer:

Option (c)

13.
From the following, which is not a common file permission?
(a) Write
(b) Execute
(c) Stop
(d) Read
Answer:

Option (c)

14.
Which of the following is a good practice?
(a) Give full permission for remote transferring
(b) Grant read only permission
(c) Give both read and write permission but not execute
(d) Grant limited permission to specified account
Answer:

Option (d)

15.
Which of the following is a strong password?
(a) 19thAugust88
(b) Darshan025
(c) Engineering
(d) P@assw0rd
Answer:

Option (d)

16.
Which happens first authorization or authentication?
(a) Authorization
(b) Authentication
(c) Authorization & Authentication are same
(d) None of the mentioned
Answer:

Option (a)

17.
What is theft of service?
(a) This type of violation involves unauthorized reading of data
(b) This violation involves unauthorized modification of data
(c) This violation involves unauthorized destruction of data
(d) This violation involves unauthorized use of resources
Answer:

Option (d)

18.
What is Trojan horse?
(a) It is a useful way to encrypt password
(b) It is a user which steals valuable information
(c) It is a rogue program which tricks users
(d) It’s a brute force attack algorithm
Answer:

Option (c)

19.
What is trap door?
(a) It is trap door in WarGames
(b) It is a hole in software left by designer
(c) It is a Trojan horse
(d) It is a virus which traps and locks user terminal
Answer:

Option (b)

20.
What is used to protect network from outside internet access?
(a) A trusted antivirus
(b) 24 hours scanning for virus
(c) Firewall to separate trusted and untrusted network
(d) Deny users access to websites which can potentially cause security leak
Answer:

Option (c)

Showing 11 to 20 out of 33 Questions