Operating System Questions & Answers – Security

This set of Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Security”.

1. When an attempt is to make a machine or network resource unavailable to its intended users, the attack is called _____________
a) denial-of-service attack
b) slow read attack
c) spoofed attack
d) starvation attack
View Answer

Answer: a
Explanation: None.

2. The code segment that misuses its environment is called a _____________
a) internal thief
b) trojan horse
c) code stacker
d) none of the mentioned
View Answer

Answer: b
Explanation: None.

3. The internal code of any software that will set of a malicious function when specified conditions are met, is called _____________
a) logic bomb
b) trap door
c) code stacker
d) none of the mentioned
View Answer

Answer: a
Explanation: None.
advertisement
advertisement

4. The pattern that can be used to identify a virus is known as _____________
a) stealth
b) virus signature
c) armoured
d) multipartite
View Answer

Answer: b
Explanation: None.

5. Which one of the following is a process that uses the spawn mechanism to revage the system performance?
a) worm
b) trojan
c) threat
d) virus
View Answer

Answer: a
Explanation: None.

6. What is a trap door in a program?
a) a security hole, inserted at programming time in the system for later use
b) a type of antivirus
c) security hole in a network
d) none of the mentioned
View Answer

Answer: a
Explanation: None.

7. Which one of the following is not an attack, but a search for vulnerabilities to attack?
a) denial of service
b) port scanning
c) memory access violation
d) dumpster diving
View Answer

Answer: b
Explanation: None.
advertisement

8. File virus attaches itself to the _____________
a) source file
b) object file
c) executable file
d) all of the mentioned
View Answer

Answer: c
Explanation: None.

9. Multipartite viruses attack on _____________
a) files
b) boot sector
c) memory
d) all of the mentioned
View Answer

Answer: d
Explanation: None.
advertisement

10. In asymmetric encryption _____________
a) same key is used for encryption and decryption
b) different keys are used encryption and decryption
c) no key is required for encryption and decryption
d) none of the mentioned
View Answer

Answer: b
Explanation: None.

Sanfoundry Global Education & Learning Series – Operating System.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.