250+ TOP MCQs on Security and Answers

Operating System Multiple Choice Questions on “Security”.

1. When an attempt is to make a machine or network resource unavailable to its intended users, the attack is called _____________
a) denial-of-service attack
b) slow read attack
c) spoofed attack
d) starvation attack

Answer: a

2. The code segment that misuses its environment is called a _____________
a) internal thief
b) trojan horse
c) code stacker
d) none of the mentioned

Answer: b

3. The internal code of any software that will set of a malicious function when specified conditions are met, is called _____________
a) logic bomb
b) trap door
c) code stacker
d) none of the mentioned

Answer: a

4. The pattern that can be used to identify a virus is known as _____________
a) stealth
b) virus signature
c) armoured
d) multipartite

Answer: b

5. Which one of the following is a process that uses the spawn mechanism to revage the system performance?
a) worm
b) trojan
c) threat
d) virus

Answer: a

6. What is a trap door in a program?
a) a security hole, inserted at programming time in the system for later use
b) a type of antivirus
c) security hole in a network
d) none of the mentioned

Answer: a

7. Which one of the following is not an attack, but a search for vulnerabilities to attack?
a) denial of service
b) port scanning
c) memory access violation
d) dumpster diving

Answer: b
Clarification: None.

8. File virus attaches itself to the _____________
a) source file
b) object file
c) executable file
d) all of the mentioned

Answer: c
Clarification: None.

9. Multipartite viruses attack on _____________
a) files
b) boot sector
c) memory
d) all of the mentioned

Answer: d
Clarification: None.

10. In asymmetric encryption _____________
a) same key is used for encryption and decryption
b) different keys are used encryption and decryption
c) no key is required for encryption and decryption
d) none of the mentioned

Answer: b

Leave a Reply

Your email address will not be published. Required fields are marked *