Operating System MCQ and Answers – Security

These Operating System MCQ and Answers – Security are asked in various examinations including BCA, MCA, GATE, and other tests. The questions based on the below Operating System MCQ and Answers – Security test your basic knowledge of MCQs on the topic of Operating Systems and the level of comprehension and grasp that you hold.

Operating System MCQ and Answers – Security

1. Which one of the following is a process that uses the spawn mechanism to revenge the system performance?

a) worm

b) trojan

c) threat

d) virus

Answer: a

2. What is a trap door in a program?

a) a security hole, inserted at programming time in the system for later use

b) a type of antivirus

c) security hole in a network

d) none of the mentioned

Answer: a

3. Which one of the following is not an attack, but a search for vulnerabilities to attack?

a) denial of service

b) port scanning

c) memory access violation

d) dumpster diving

Answer: b

4. File virus attaches itself to the _____________

a) source file

b) object file

c) executable file

d) all of the mentioned

Answer: c

5. Multipartite viruses attack on _____________

a) files

b) boot sector

c) memory

d) all of the mentioned

Answer: d

6. In asymmetric encryption _____________

a) same key is used for encryption and decryption

b) different keys are used encryption and decryption

c) no key is required for encryption and decryption

d) none of the mentioned

Answer: b

7. When an attempt is to make a machine or network resource unavailable to its intended users, the attack is called _____________

a) denial-of-service attack

b) slow read attack

c) spoofed attack

d) starvation attack

Answer: a

8. The code segment that misuses its environment is called a _____________

a) internal thief

b) trojan horse

c) code stacker

d) none of the mentioned

Answer: b

9. The internal code of any software that will set of a malicious function when specified conditions are met, is called _____________

a) logic bomb

b) trap door

c) code stacker

d) none of the mentioned

Answer: a

10. The pattern that can be used to identify a virus is known as _____________

a) stealth

b) virus signature

c) armoured

d) multipartite

Answer: b

Comments