Operating System Multiple Choice Questions on “Security”.
1. When an attempt is to make a machine or network resource unavailable to its intended users, the attack is called _____________
a) denial-of-service attack
b) slow read attack
c) spoofed attack
d) starvation attack
Answer: a
2. The code segment that misuses its environment is called a _____________
a) internal thief
b) trojan horse
c) code stacker
d) none of the mentioned
Answer: b
3. The internal code of any software that will set of a malicious function when specified conditions are met, is called _____________
a) logic bomb
b) trap door
c) code stacker
d) none of the mentioned
Answer: a
4. The pattern that can be used to identify a virus is known as _____________
a) stealth
b) virus signature
c) armoured
d) multipartite
Answer: b
5. Which one of the following is a process that uses the spawn mechanism to revage the system performance?
a) worm
b) trojan
c) threat
d) virus
Answer: a
6. What is a trap door in a program?
a) a security hole, inserted at programming time in the system for later use
b) a type of antivirus
c) security hole in a network
d) none of the mentioned
Answer: a
7. Which one of the following is not an attack, but a search for vulnerabilities to attack?
a) denial of service
b) port scanning
c) memory access violation
d) dumpster diving
Answer: b
Clarification: None.
8. File virus attaches itself to the _____________
a) source file
b) object file
c) executable file
d) all of the mentioned
Answer: c
Clarification: None.
9. Multipartite viruses attack on _____________
a) files
b) boot sector
c) memory
d) all of the mentioned
Answer: d
Clarification: None.
10. In asymmetric encryption _____________
a) same key is used for encryption and decryption
b) different keys are used encryption and decryption
c) no key is required for encryption and decryption
d) none of the mentioned
Answer: b