Operating System Questions & Answers – Security – Program and System Threats

This set of Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Security – Program and System Threats”.

1. What is the breach of integrity?
a) This type of violation involves unauthorized reading of data
b) This violation involves unauthorized modification of data
c) This violation involves unauthorized destruction of data
d) This violation involves unauthorized use of resources
View Answer

Answer: b
Explanation: None.

2. What is breach of confidentiality?
a) This type of violation involves unauthorized reading of data
b) This violation involves unauthorized modification of data
c) This violation involves unauthorized destruction of data
d) This violation involves unauthorized use of resources
View Answer

Answer: a
Explanation: None.

3. What is theft of service?
a) This type of violation involves unauthorized reading of data
b) This violation involves unauthorized modification of data
c) This violation involves unauthorized destruction of data
d) This violation involves unauthorized use of resources
View Answer

Answer: d
Explanation: None.
advertisement
advertisement

4. What is breach of availability?
a) This type of violation involves unauthorized reading of data
b) This violation involves unauthorized modification of data
c) This violation involves unauthorized destruction of data
d) This violation involves unauthorized use of resources
View Answer

Answer: c
Explanation: None.

5. What is Trojan horse?
a) It is a useful way to encrypt password
b) It is a user which steals valuable information
c) It is a rogue program which tricks users
d) It’s a brute force attack algorithm
View Answer

Answer: c
Explanation: None.

6. What is trap door?
a) IT is trap door in WarGames
b) It is a hole in software left by designer
c) It is a Trojan horse
d) It is a virus which traps and locks user terminal
View Answer

Answer: b
Explanation: None.

7. Which mechanism is used by worm process?
a) Trap door
b) Fake process
c) Spawn Process
d) VAX process
View Answer

Answer: c
Explanation: None.
advertisement

8. Which of the following is not a characteristic of a virus?
a) Virus destroy and modify user data
b) Virus is a standalone program
c) Virus is a code embedded in a legitimate program
d) Virus cannot be detected
View Answer

Answer: d
Explanation: Virus can be detected by having an antivirus program.

9. What is known as masquerading?
a) When one participant in communication pretends to be someone else
b) When attacker modifies data in communication
c) When attack is of fraudulent repeat of a valid data
d) When attack gains access to remote systems
View Answer

Answer: a
Explanation: None.
advertisement

10. Who unleashed famous worm attack in 1988 which effected UNIX systems and caused losses in millions?
a) Robert Morris
b) Bob Milano
c) Mark zuckerberg
d) Bill Gates
View Answer

Answer: a
Explanation: None.

11. What is port scanning?
a) It is a software used to scan system for attack
b) It is a software application designed to probe a server or host for open ports
c) It is software used to scan system for introducing attacks by brute force
d) None of the mentioned
View Answer

Answer: b
Explanation: None.

12. Which is not a port scan type?
a) TCP scanning
b) SYN scanning
c) UDP scanning
d) SYSTEM Scanning
View Answer

Answer: d
Explanation: None.

13. Which is not a valid port scan type?
a) ACK scanning
b) Window scanning
c) IGMP scan
d) FIN scanning
View Answer

Answer: c
Explanation: None.

14. What are zombie systems?
a) Are specific system which are designed to attack by manufacturer
b) They are network of known hacking group
c) These systems are previously compromised independent systems
d) None of the mentioned
View Answer

Answer: c
Explanation: None.

15. What is known as a DOS attack?
a) It is attacked to block traffic of network
b) It is attacked to harm contents stored in HDD by worm spawn processes
c) It is an attempt to make a machine or network resource unavailable
d) None of the mentioned
View Answer

Answer: c
Explanation: None.

16. With regard to DOS attack what is not true from below options?
a) We can stop DOS attack completely
b) By upgrading OS vulnerability we can stop DOS attack to some extent
c) DOS attack has to be stopped at network level
d) Such attack can last for hours
View Answer

Answer: a
Explanation: None.

Sanfoundry Global Education & Learning Series – Operating System.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.