Security - Operating System Questions & Answers

1.

When an attempt is to make a machine or network resource unavailable to its intended users, the attack is called

   A.) denial-of-service attack
   B.) slow read attack
   C.) spoofed attack
   D.) starvation attack

Answer: Option 'A'

​denial-of-service attack

2.

The code segment that misuses its environment is called a

   A.) internal thief
   B.) trojan horse
   C.) code stacker
   D.) none of the mentioned

Answer: Option 'B'

​trojan horse

3.

The internal code of any software that will set of a malicious function when specified conditions are met, is called

   A.) logic bomb
   B.) trap door
   C.) code stacker
   D.) none of the mentioned

Answer: Option 'A'

​logic bomb

4.

Which one of the following is a process that uses the spawn mechanism to revage the system performance?

   A.) trojan
   B.) worm
   C.) threat
   D.) virus

Answer: Option 'B'

​worm

5.

The pattern that can be used to identify a virus is known as

   A.) stealth
   B.) virus signature
   C.) multipartite
   D.) armoured

Answer: Option 'B'

virus signature

6.

What is a trap door in a program?

   A.) a security hole, inserted at programming time in the system for later use
   B.) a type of antivirus
   C.) security hole in a network
   D.) none of the mentioned

Answer: Option 'A'

a security hole, inserted at programming time in the system for later use

7.

Which one of the following is not an attack, but a search for vulnerabilities to attack?

   A.) denial of service
   B.) port scanning
   C.) memory access violation
   D.) dumpster diving

Answer: Option 'B'

​port scanning

8.

File virus attaches itself to the

   A.) source file
   B.) object file
   C.) executable file
   D.) all of the mentioned

Answer: Option 'C'

​executable file

9.

Multipartite viruses attack on

   A.) files
   B.) boot sector
   C.) memory
   D.) all of the mentioned

Answer: Option 'D'

all of the mentioned

10.

In asymmetric encryption

   A.) same key is used for encryption and decryption
   B.) different keys are used encryption and decryption
   C.) different keys are used encryption and decryption
   D.) none of the mentioned

Answer: Option 'B'

​different keys are used encryption and decryption

Security - Operating System Questions & Answers Download Pdf

Recent Posts