Home / CSE MCQs / OS MCQs :: Security - Operating System

CSE MCQs :: OS MCQs

  1. Which mechanism is used by worm process ?
  2. A.
    Trap door
    B.
    Fake process
    C.
    Spawn Process
    D.
    VAX process

    View Answer

    Workspace

    Discuss Discuss in Forum


  3. What is known as masquerading ?
  4. A.
    When one participant in communication pretends to be someone else.
    B.
    When attacker modifies data in communication
    C.
    When attack is of fraudulent repeat of a valid data
    D.
    When attack gains access to remote systems.

    View Answer

    Workspace

    Discuss Discuss in Forum


  5. Who unleashed famous worm attack in 1988 which effected UNIX systems and caused losses in millions ?
  6. A.
    Robert Morris
    B.
    Bob Milano
    C.
    Mark zuckerberg
    D.
    Bill Gates

    View Answer

    Workspace

    Discuss Discuss in Forum


  7. What is port scanning ?
  8. A.
    It is a software used to scan system for attack
    B.
    It is a software application designed to probe a server or host for open ports
    C.
    It is software used to scan system for introducing attacks by brute force
    D.
    None of the mentioned

    View Answer

    Workspace

    Discuss Discuss in Forum


  9. Which is not a port scan type ?
  10. A.
    TCP scanning
    B.
    SYN scanning
    C.
    UDP scanning
    D.
    SYSTEM Scanning

    View Answer

    Workspace

    Discuss Discuss in Forum


  11. Which is not a valid port scan type ?
  12. A.
    ACK scanning
    B.
    Window scanning
    C.
    IGMP scan
    D.
    FIN scanning

    View Answer

    Workspace

    Discuss Discuss in Forum


  13. What are zombie systems ?
  14. A.
    Are specific system which are designed to attack by manufacturer
    B.
    They are network of known hacking group
    C.
    These systems are previously compromised, independent systems
    D.
    None of the mentioned

    View Answer

    Workspace

    Discuss Discuss in Forum


  15. What is known as DOS attack ?
  16. A.
    It is attack to block traffic of network
    B.
    It is attack to harm contents stored in HDD by worm spawn processes
    C.
    It is an attempt to make a machine or network resource unavailable.
    D.
    None of the mentioned

    View Answer

    Workspace

    Discuss Discuss in Forum


  17. With regard to DOS attack what is not true from below options ?
  18. A.
    We can stop DOS attack completely
    B.
    By upgrading OS vulnerability we can stop DOS attack to some extent
    C.
    DOS attack has to be stopped at network level
    D.
    Suck attack can last for hours

    View Answer

    Workspace

    Discuss Discuss in Forum


  19. What is not a important part of security protection ?
  20. A.
    Large amount of RAM to support antivirus
    B.
    Strong passwords
    C.
    Audit log periodically
    D.
    Scan for unauthorized programs in system directories

    View Answer

    Workspace

    Discuss Discuss in Forum