Operating System MCQ and Answers – Security – Securing Systems and Facilities

These Operating System MCQ and Answers – Securing Systems and Facilities are asked in various examinations including BCA, MCA, GATE, and other tests. The questions based on the below Operating System MCQ and Answers – Securing Systems and Facilities test your basic knowledge of MCQs on the topic of Operating Systems and the level of comprehension and grasp that you hold.

Operating System MCQ and Answers – Security – Securing Systems and Facilities

1. Which direction access cannot happen using DMZ zone by default?

a) Company computer to DMZ

b) Internet to DMZ

c) Internet to company computer

d) Company computer to internet

Answer: c

2. What are the two features of a tripwire file system?

a) It is a tool to monitor file systems

b) It is used to automatically take corrective action

c) It is used to secure UNIX system

d) None of the mentioned

Answer: a

3. How do viruses avoid basic pattern match of antivirus?

a) They are encrypted

b) They act with special permissions

c) They modify themselves

d) None of the mentioned

Answer: c

4. How does an antivirus of today identify viruses?

a) Previously known patterns

b) It can detect unknown patterns

c) It can take high priority to increase scanning speed

d) None of the mentioned

Answer: a

5. What is known as a sandbox?

a) It is a program which can be molded to do the desired task

b) It is a program that is controlled or emulated section of OS

c) It is a special mode of antivirus

d) None of the mentioned

Answer: b

6. What is are two safe computing practices?

a) Not to open software from unknown vendors

b) Open and execute programs in admin level/root

c) Open and execute programs in presence of antivirus

d) None of the mentioned

Answer: a

7. What is not an important part of security protection?

a) Large amount of RAM to support antivirus

b) Strong passwords

c) Audit log periodically

d) Scan for unauthorized programs in system directories

Answer: a

8. What is used to protect network from outside internet access?

a) A trusted antivirus

b) 24 hours scanning for virus

c) Firewall to separate trusted and untrusted network

d) Deny users access to websites which can potentially cause security leak

Answer: c

9. What is the best practice in the firewall domain environment?

a) Create two domain trusted and untrusted domain

b) Create strong policy in firewall to support different types of users

c) Create a Demilitarized zone

d) Create two DMZ zones with one untrusted domain

Answer: c

Comments