Home / CSE MCQs / OS MCQs :: Security - Operating System

CSE MCQs :: OS MCQs

  1. Which happens first authorization or authentication ?
  2. A.
    Authorization
    B.
    Authentication
    C.
    Both are same
    D.
    None of the mentioned

    View Answer

    Workspace

    Discuss Discuss in Forum


  3. What is characteristics of Authorization ?
  4. A.
    RADIUS and RSA
    B.
    3 way handshaking with syn and fin.
    C.
    Multilayered protection for securing resources
    D.
    Deals with privileges and rights

    View Answer

    Workspace

    Discuss Discuss in Forum


  5. What forces the user to change password at first logon ?
  6. A.
    Default behavior of OS
    B.
    Part of AES encryption practice
    C.
    Devices being accessed forces the user
    D.
    Account administrator

    View Answer

    Workspace

    Discuss Discuss in Forum


  7. What is not a best practice for password policy ?
  8. A.
    Deciding maximum age of password
    B.
    Restriction on password reuse and history
    C.
    Password encryption
    D.
    Having change password every 2 years.

    View Answer

    Workspace

    Discuss Discuss in Forum


  9. What is breach of integrity ?
  10. A.
    This type of violation involves unauthorized reading of data
    B.
    This violation involves unauthorized modification of data.
    C.
    This violation involves unauthorized destruction of data
    D.
    This violation involves unauthorized use of resources

    View Answer

    Workspace

    Discuss Discuss in Forum


  11. What is breach of confidentiality ?
  12. A.
    This type of violation involves unauthorized reading of data
    B.
    This violation involves unauthorized modification of data.
    C.
    This violation involves unauthorized destruction of data
    D.
    This violation involves unauthorized use of resources

    View Answer

    Workspace

    Discuss Discuss in Forum


  13. What is theft of service ?
  14. A.
    This type of violation involves unauthorized reading of data
    B.
    This violation involves unauthorized modification of data.
    C.
    This violation involves unauthorized destruction of data
    D.
    This violation involves unauthorized use of resources

    View Answer

    Workspace

    Discuss Discuss in Forum


  15. What is breach of availability ?
  16. A.
    This type of violation involves unauthorized reading of data
    B.
    This violation involves unauthorized modification of data.
    C.
    This violation involves unauthorized destruction of data
    D.
    This violation involves unauthorized use of resources

    View Answer

    Workspace

    Discuss Discuss in Forum


  17. What is Trojan horse ?
  18. A.
    IT a useful way to encrypt password
    B.
    It is a user which steals valuable information
    C.
    It is a rogue program which tricks users
    D.
    It's a brute force attack algorithm.

    View Answer

    Workspace

    Discuss Discuss in Forum


  19. What is trap door ?
  20. A.
    IT is trap door in WarGames
    B.
    It is a hole in software left by designer.
    C.
    It is a Trojan horse
    D.
    It is a virus which traps and locks user terminal

    View Answer

    Workspace

    Discuss Discuss in Forum