-
1. Which principle states that programs, users and even the systems be given just enough privileges to perform their task?
- Principle of operating system
- Principle of least privilege
- Principle of process scheduling
- None of the mentioned
Show Answer
Answer : Option ( b ) 2. _______ is an approach to restricting system access to authorized users.
- Role-based access control
- Process-based access control
- Job-based access control
- None of the mentioned
Show Answer
Answer : Option ( a )3. For system protection, a process should access _____________
- all the resources
- few resources but authorization is not required
- only those resources for which it has authorization
- All of the mentioned
Show Answer
Answer : Option ( c )4. The protection domain of a process contains _____________
- object name
- rights-set
- both object name and rights-set
- None of the mentioned
Show Answer
Answer : Option ( c )5. If the set of resources available to the process is fixed throughout the process’s lifetime then its domain is _____________
- static
- dynamic
- neither static nor dynamic
- both static as well as dynamic
Show Answer
Answer : Option ( a )6. Access matrix model for user authentication contains _____________
- a list of objects
- a list of domains
- a function which returns an object’s type
- All of the mentioned
Show Answer
Answer : Option ( d )7. In domain structure what is Access-right equal to?
- Access-right = read-name, write-set
- Access-right = object-name, rights-set
- Access-right = read-name, execute-set
- Access-right = object-name, execute-set
Show Answer
Answer : Option ( b )8. What does the access matrix represent?
- Rows-Domains, Columns-Objects
- Rows-Objects, Columns-Domains
- Rows-Access List, Columns-Domains
- Rows-Domains, Columns-Access list
Show Answer
Answer : Option ( a )9. Who can add new rights and remove some rights?
- Copy
- Transfer
- Limited copy
- Owner
Show Answer
Answer : Option ( d )10. Which of the following objects require protection?
- Memory
- Monitor
- Power supply unit
- All of the mentioned
Show Answer
Answer : Option ( a )11. What is a trap door in a program?
- A type of antivirus
- Security hole in a network
- A security hole, inserted at programming time in the system for later use
- None of the mentioned
Show Answer
Answer : Option ( c )12. File virus attaches itself to the _____________
- source file
- object file
- executable file
- All of the mentioned
Show Answer
Answer : Option ( c )13. From the following, which is not a common file permission?
- Write
- Execute
- Stop
- Read
Show Answer
Answer : Option ( c )14. Which of the following is a good practice?
- Give full permission for remote transferring
- Grant read only permission
- Give both read and write permission but not execute
- Grant limited permission to specified account
Show Answer
Answer : Option ( d )15. Which of the following is a strong password?
- 19thAugust88
- Darshan025
- Engineering
- P@assw0rd
Show Answer
Answer : Option ( d )16. Which happens first authorization or authentication?
- Authorization
- Authentication
- Authorization & Authentication are same
- None of the mentioned
Show Answer
Answer : Option ( a )17. What is theft of service?
- This type of violation involves unauthorized reading of data
- This violation involves unauthorized modification of data
- This violation involves unauthorized destruction of data
- This violation involves unauthorized use of resources
Show Answer
Answer : Option ( d )18. What is Trojan horse?
- It is a useful way to encrypt password
- It is a user which steals valuable information
- It is a rogue program which tricks users
- It’s a brute force attack algorithm
Show Answer
Answer : Option ( c )19. What is trap door?
- It is trap door in WarGames
- It is a hole in software left by designer
- It is a Trojan horse
- It is a virus which traps and locks user terminal
Show Answer
Answer : Option ( b )20. What is used to protect network from outside internet access?
- A trusted antivirus
- 24 hours scanning for virus
- Firewall to separate trusted and untrusted network
- Deny users access to websites which can potentially cause security leak
Show Answer
Answer : Option ( c )21. Which of the following is/are Design Principles of Security?
- Principles of least privileges
- Principles of separation of privileges
- Principles of least common mechanism
- All of the mentioned
Show Answer
Answer : Option ( d )22. Which Design Principles of Security states that unless the subject is given explicit access to the object it should be denied access to that object?
- Principles of least privileges
- Principles of separation of privileges
- Principles of least common mechanism
- Principles of fail safe defaults
Show Answer
Answer : Option ( d )23. Which Design Principles of Security states that subject should be given only those privileges that it requires?
- Principles of least privileges
- Principles of separation of privileges
- Principles of least common mechanism
- Principles of fail safe defaults
Show Answer
Answer : Option ( a )24. Which Design Principles of Security states that all the accesses to object be checked in order to ensure that they are allowed?
- Principles of least privileges
- Principles of separation of privileges
- Principles of complete mediation
- Principles of fail safe defaults
Show Answer
Answer : Option ( c )25. What forces the user to change password at first logon ?
- Default behavior of OS
- Part of AES encryption practice
- Devices being accessed forces the user
- Account administrator
Show Answer
Answer : Option ( d )26. What is trap door?
- It is a secret entry point into a program
- It is a hole in software left by designer
- Both A and B
- None of the mentioned
Show Answer
Answer : Option ( c )27. Which one is not an antivirus?
- Norton
- Quick Heal
- AVG
- MS Office
Show Answer
Answer : Option ( d )28. ______________ software is a type of program designed and developed to protect computers from malware like viruses, computer worms, spyware etc.
- System
- Antivirus
- Fighter
- Preventer
Show Answer
Answer : Option ( b )29. The functions of Antivirus programs is/are _________
- scan the system
- detect viruses
- remove viruses
- All of the mentioned
Show Answer
Answer : Option ( d )30. _____________ confirms your identity to grant access to the system.
- Authentication
- Authorization
- Encryption
- None of the mentioned
Show Answer
Answer : Option ( a )31. ____________determines whether you are authorized to access the resources.
- Authentication
- Authorization
- Encryption
- None of the mentioned
Show Answer
Answer : Option ( b )32. When you log on to a PC with a user name and password you are ______________
- authenticating
- authorizing
- Encrypting
- None of the mentioned
Show Answer
Answer : Option ( a )33. What is the fullform of virus?
- Vital Information Resources Under Size
- Vital Information Reads Under Seize
- Vital Information Resources Under Seize
- None of the mentioned
Show Answer
Answer : Option ( c )
Security & Protection | Operating System
May 05, 2022
0