Security & Protection | Operating System

CoderIndeed
0
  1. 1. Which principle states that programs, users and even the systems be given just enough privileges to perform their task?

    1. Principle of operating system
    2. Principle of least privilege
    3. Principle of process scheduling
    4. None of the mentioned
    Show Answer
    Answer :     Option ( b )
  2. 2. _______ is an approach to restricting system access to authorized users.

    1. Role-based access control
    2. Process-based access control
    3. Job-based access control
    4. None of the mentioned
    Show Answer
    Answer :     Option ( a )
  3. 3. For system protection, a process should access _____________

    1. all the resources
    2. few resources but authorization is not required
    3. only those resources for which it has authorization
    4. All of the mentioned
    Show Answer
    Answer :     Option ( c )
  4. 4. The protection domain of a process contains _____________

    1. object name
    2. rights-set
    3. both object name and rights-set
    4. None of the mentioned
    Show Answer
    Answer :     Option ( c )
  5. 5. If the set of resources available to the process is fixed throughout the process’s lifetime then its domain is _____________

    1. static
    2. dynamic
    3. neither static nor dynamic
    4. both static as well as dynamic
    Show Answer
    Answer :     Option ( a )
  6. 6. Access matrix model for user authentication contains _____________

    1. a list of objects
    2. a list of domains
    3. a function which returns an object’s type
    4. All of the mentioned
    Show Answer
    Answer :     Option ( d )
  7. 7. In domain structure what is Access-right equal to?

    1. Access-right = read-name, write-set
    2. Access-right = object-name, rights-set
    3. Access-right = read-name, execute-set
    4. Access-right = object-name, execute-set
    Show Answer
    Answer :     Option ( b )
  8. 8. What does the access matrix represent?

    1. Rows-Domains, Columns-Objects
    2. Rows-Objects, Columns-Domains
    3. Rows-Access List, Columns-Domains
    4. Rows-Domains, Columns-Access list
    Show Answer
    Answer :     Option ( a )
  9. 9. Who can add new rights and remove some rights?

    1. Copy
    2. Transfer
    3. Limited copy
    4. Owner
    Show Answer
    Answer :     Option ( d )
  10. 10. Which of the following objects require protection?

    1. Memory
    2. Monitor
    3. Power supply unit
    4. All of the mentioned
    Show Answer
    Answer :     Option ( a )
  11. 11. What is a trap door in a program?

    1. A type of antivirus
    2. Security hole in a network
    3. A security hole, inserted at programming time in the system for later use
    4. None of the mentioned
    Show Answer
    Answer :     Option ( c )
  12. 12. File virus attaches itself to the _____________

    1. source file
    2. object file
    3. executable file
    4. All of the mentioned
    Show Answer
    Answer :     Option ( c )
  13. 13. From the following, which is not a common file permission?

    1. Write
    2. Execute
    3. Stop
    4. Read
    Show Answer
    Answer :     Option ( c )
  14. 14. Which of the following is a good practice?

    1. Give full permission for remote transferring
    2. Grant read only permission
    3. Give both read and write permission but not execute
    4. Grant limited permission to specified account
    Show Answer
    Answer :     Option ( d )
  15. 15. Which of the following is a strong password?

    1. 19thAugust88
    2. Darshan025
    3. Engineering
    4. P@assw0rd
    Show Answer
    Answer :     Option ( d )
  16. 16. Which happens first authorization or authentication?

    1. Authorization
    2. Authentication
    3. Authorization & Authentication are same
    4. None of the mentioned
    Show Answer
    Answer :     Option ( a )
  17. 17. What is theft of service?

    1. This type of violation involves unauthorized reading of data
    2. This violation involves unauthorized modification of data
    3. This violation involves unauthorized destruction of data
    4. This violation involves unauthorized use of resources
    Show Answer
    Answer :     Option ( d )
  18. 18. What is Trojan horse?

    1. It is a useful way to encrypt password
    2. It is a user which steals valuable information
    3. It is a rogue program which tricks users
    4. It’s a brute force attack algorithm
    Show Answer
    Answer :     Option ( c )
  19. 19. What is trap door?

    1. It is trap door in WarGames
    2. It is a hole in software left by designer
    3. It is a Trojan horse
    4. It is a virus which traps and locks user terminal
    Show Answer
    Answer :     Option ( b )
  20. 20. What is used to protect network from outside internet access?

    1. A trusted antivirus
    2. 24 hours scanning for virus
    3. Firewall to separate trusted and untrusted network
    4. Deny users access to websites which can potentially cause security leak
    Show Answer
    Answer :     Option ( c )
  21. 21. Which of the following is/are Design Principles of Security?

    1. Principles of least privileges
    2. Principles of separation of privileges
    3. Principles of least common mechanism
    4. All of the mentioned
    Show Answer
    Answer :     Option ( d )
  22. 22. Which Design Principles of Security states that unless the subject is given explicit access to the object it should be denied access to that object?

    1. Principles of least privileges
    2. Principles of separation of privileges
    3. Principles of least common mechanism
    4. Principles of fail safe defaults
    Show Answer
    Answer :     Option ( d )
  23. 23. Which Design Principles of Security states that subject should be given only those privileges that it requires?

    1. Principles of least privileges
    2. Principles of separation of privileges
    3. Principles of least common mechanism
    4. Principles of fail safe defaults
    Show Answer
    Answer :     Option ( a )
  24. 24. Which Design Principles of Security states that all the accesses to object be checked in order to ensure that they are allowed?

    1. Principles of least privileges
    2. Principles of separation of privileges
    3. Principles of complete mediation
    4. Principles of fail safe defaults
    Show Answer
    Answer :     Option ( c )
  25. 25. What forces the user to change password at first logon ?

    1. Default behavior of OS
    2. Part of AES encryption practice
    3. Devices being accessed forces the user
    4. Account administrator
    Show Answer
    Answer :     Option ( d )
  26. 26. What is trap door?

    1. It is a secret entry point into a program
    2. It is a hole in software left by designer
    3. Both A and B
    4. None of the mentioned
    Show Answer
    Answer :     Option ( c )
  27. 27. Which one is not an antivirus?

    1. Norton
    2. Quick Heal
    3. AVG
    4. MS Office
    Show Answer
    Answer :     Option ( d )
  28. 28. ______________ software is a type of program designed and developed to protect computers from malware like viruses, computer worms, spyware etc.

    1. System
    2. Antivirus
    3. Fighter
    4. Preventer
    Show Answer
    Answer :     Option ( b )
  29. 29. The functions of Antivirus programs is/are _________

    1. scan the system
    2. detect viruses
    3. remove viruses
    4. All of the mentioned
    Show Answer
    Answer :     Option ( d )
  30. 30. _____________ confirms your identity to grant access to the system.

    1. Authentication
    2. Authorization
    3. Encryption
    4. None of the mentioned
    Show Answer
    Answer :     Option ( a )
  31. 31. ____________determines whether you are authorized to access the resources.

    1. Authentication
    2. Authorization
    3. Encryption
    4. None of the mentioned
    Show Answer
    Answer :     Option ( b )
  32. 32. When you log on to a PC with a user name and password you are ______________

    1. authenticating
    2. authorizing
    3. Encrypting
    4. None of the mentioned
    Show Answer
    Answer :     Option ( a )
  33. 33. What is the fullform of virus?

    1. Vital Information Resources Under Size
    2. Vital Information Reads Under Seize
    3. Vital Information Resources Under Seize
    4. None of the mentioned
    Show Answer
    Answer :     Option ( c )
Tags

Post a Comment

0Comments

Post a Comment (0)

#buttons=(Accept !) #days=(20)

Our website uses cookies to enhance your experience. Check Now
Accept !