SSC Multi-Tasking Non-Technical Staff Model Exams in Telugu

AP Grama Sachivalayam 2023 Free Test Series in Telugu (14,523 Vacancies)

Digital Assistant 2023 PART B - 100 Marks All Topics MCQs

Security – Program and System Threats - Operating System Questions & Answers

1.

What is breach of integrity?

   A.) This type of violation involves unauthorized reading of data
   B.) This violation involves unauthorized modification of data
   C.) This violation involves unauthorized destruction of data
   D.) This violation involves unauthorized use of resources

Answer: Option 'B'

This violation involves unauthorized modification of data

2.

What is theft of service?

   A.) This type of violation involves unauthorized reading of data
   B.) This violation involves unauthorized modification of data
   C.) This violation involves unauthorized destruction of data
   D.) This violation involves unauthorized use of resources

Answer: Option 'D'

This violation involves unauthorized use of resources

3.

What is Trojan horse ?

   A.) It is a useful way to encrypt password
   B.) It is a user which steals valuable information
   C.) It is a rogue program which tricks users
   D.) It’s a brute force attack algorithm

Answer: Option 'C'

It is a rogue program which tricks users

4.

Which mechanism is used by worm process ?

   A.) Trap door
   B.) Trap door
   C.) Spawn Process
   D.) VAX process

Answer: Option 'C'

Spawn Process

5.

What is known as masquerading ?

   A.) When one participant in communication pretends to be someone else
   B.) When attacker modifies data in communication
   C.) When attack is of fraudulent repeat of a valid data
   D.) When attack gains access to remote systems

Answer: Option 'A'

When one participant in communication pretends to be someone els

6.

What is port scanning?

   A.) It is a software used to scan system for attack
   B.) It is a software application designed to probe a server or host for open ports
   C.) It is software used to scan system for introducing attacks by brute force
   D.) None of the mentioned

Answer: Option 'B'

It is a software application designed to probe a server or host for open ports

7.

Which is not a valid port scan type?

   A.) ACK scanning
   B.) Window scanning
   C.) IGMP scan
   D.) FIN scanning

Answer: Option 'C'

IGMP scan

8.

What is known as DOS attack?

   A.) It is attack to block traffic of network
   B.) It is attack to harm contents stored in HDD by worm spawn processes
   C.) It is an attempt to make a machine or network resource unavailable
   D.) None of the mentioned

Answer: Option 'C'

It is an attempt to make a machine or network resource unavailable

9.

With regard to DOS attack what is not true from below options?

   A.) We can stop DOS attack completely
   B.) By upgrading OS vulnerability we can stop DOS attack to some extent
   C.) DOS attack has to be stopped at network level
   D.) Such attack can last for hours

Answer: Option 'A'

We can stop DOS attack completely

10.

What are zombie systems ?

   A.) Are specific system which are designed to attack by manufacturer
   B.) They are network of known hacking group
   C.) These systems are previously compromised, independent systems
   D.) None of the mentioned

Answer: Option 'C'

These systems are previously compromised, independent systems

11.

Which is not a port scan type?

   A.) TCP scanning
   B.) SYN scanning
   C.) UDP scanning
   D.) SYSTEM Scanning

Answer: Option 'D'

SYSTEM Scanning

12.

Who unleashed famous worm attack in 1988 which effected UNIX systems and caused losses in millions?

   A.) Robert Morris
   B.) Bob Milano
   C.) Mark zuckerberg
   D.) Bill Gates

Answer: Option 'A'

Robert Morris

13.

Which of the following is not a characteristic of virus ?

   A.) Virus destroy and modify user data
   B.) Virus is a standalone program
   C.) Virus is a code embedded in a legitimate program
   D.) Virus cannot be detected

Answer: Option 'D'

Virus cannot be detected

14.

What is trap door ?

   A.) IT is trap door in WarGames
   B.) It is a hole in software left by designer
   C.) It is a Trojan horse
   D.) It is a virus which traps and locks user terminal

Answer: Option 'B'

It is a hole in software left by designer

15.

What is breach of availability ?

   A.) This type of violation involves unauthorized reading of data
   B.) This violation involves unauthorized modification of data
   C.) This violation involves unauthorized destruction of data
   D.) This violation involves unauthorized use of resources

Answer: Option 'C'

This violation involves unauthorized destruction of data

16.

What is breach of confidentiality ?

   A.) This type of violation involves unauthorized reading of data
   B.) This violation involves unauthorized modification of data
   C.) This violation involves unauthorized destruction of data
   D.) This violation involves unauthorized use of resources

Answer: Option 'A'

This type of violation involves unauthorized reading of data


Security – Program and System Threats - Operating System Questions & Answers Download Pdf

Recent Posts