Security MCQ’s

Read Time:1 Minute, 22 Second

This set of Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Security”.

1. The code segment that misuses its environment is called a _____________
a) internal thief
b) trojan horse
c) code stacker
d) none of the mentioned

2. The internal code of any software that will set of a malicious function when specified conditions are met, is called _____________
a) logic bomb
b) trap door
c) code stacker
d) none of the mentioned

3. When an attempt is to make a machine or network resource unavailable to its intended users, the attack is called _____________
a) denial-of-service attack
b) slow read attack
c) spoofed attack
d) starvation attack

4. The pattern that can be used to identify a virus is known as _____________
a) stealth
b) virus signature
c) armoured
d) multipartite

5. What is a trap door in a program?
a) a security hole, inserted at programming time in the system for later use
b) a type of antivirus
c) security hole in a network
d) none of the mentioned

6. File virus attaches itself to the _____________
a) source file
b) object file
c) executable file
d) all of the mentioned

7. Which one of the following is a process that uses the spawn mechanism to revage the system performance?
a) worm
b) trojan
c) threat
d) virus

8. Which one of the following is not an attack, but a search for vulnerabilities to attack?
a) denial of service
b) port scanning
c) memory access violation
d) dumpster diving

9. Multipartite viruses attack on _____________
a) files
b) boot sector
c) memory
d) all of the mentioned

10. In asymmetric encryption _____________
a) same key is used for encryption and decryption
b) different keys are used encryption and decryption
c) no key is required for encryption and decryption
d) none of the mentioned

Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

Average Rating

5 Star
0%
4 Star
0%
3 Star
0%
2 Star
0%
1 Star
0%

Leave a Reply

Your email address will not be published. Required fields are marked *

Previous post Protection MCQ’s
Next post Protection – Memory Protection MCQ’s