250+ TOP MCQs on Security – Securing Systems and Facilities

Operating System Multiple Choice Questions on “Security – Securing Systems and Facilities”.

1. What is not an important part of security protection?
a) Large amount of RAM to support antivirus
b) Strong passwords
c) Audit log periodically
d) Scan for unauthorized programs in system directories

Answer: a
Clarification: RAM has no effect on security of a system. System’s protection remains unchanged in increasing or decreasing amount of RAM.

2. What is used to protect network from outside internet access?
a) A trusted antivirus
b) 24 hours scanning for virus
c) Firewall to separate trusted and untrusted network
d) Deny users access to websites which can potentially cause security leak

Answer: c
Clarification: Firewall create a protective barrier to secure internal network. An antivirus can only detect harmful viruses but cannot stop illegal access by remote attacker.

3. What is the best practice in the firewall domain environment?
a) Create two domain trusted and untrusted domain
b) Create strong policy in firewall to support different types of users
c) Create a Demilitarized zone
d) Create two DMZ zones with one untrusted domain

Answer: c
Clarification: All live servers or workstations are kept in a separate zone than inside and outside to enhance protection.

4. Which direction access cannot happen using DMZ zone by default?
a) Company computer to DMZ
b) Internet to DMZ
c) Internet to company computer
d) Company computer to internet

Answer: c
Clarification: Connection from internet is never allowed to directly access internal PCs but is routed through DMZ zone to prevent attacks.

5. What are the two features of a tripwire file system?
a) It is a tool to monitor file systems
b) It is used to automatically take corrective action
c) It is used to secure UNIX system
d) None of the mentioned

Answer: a
Clarification: None.

6. How do viruses avoid basic pattern match of antivirus?
a) They are encrypted
b) They act with special permissions
c) They modify themselves
d) None of the mentioned

Answer: c
Clarification: None.

7. How does an antivirus of today identify viruses?
a) Previously known patterns
b) It can detect unknown patterns
c) It can take high priority to increase scanning speed
d) None of the mentioned

Answer: a
Clarification: None.

8. What is known as a sandbox?
a) It is a program which can be molded to do the desired task
b) It is a program that is controlled or emulated section of OS
c) It is a special mode of antivirus
d) None of the mentioned

Answer: b
Clarification: None.

9. What is are two safe computing practices?
a) Not to open software from unknown vendors
b) Open and execute programs in admin level/root
c) Open and execute programs in presence of antivirus
d) None of the mentioned

Answer: a
Clarification: Disgruntled employees have in past infected the master copies of software programs to do economic harm to the company.

Leave a Reply

Your email address will not be published. Required fields are marked *