Home / CSE MCQs / OS MCQs :: Security - Operating System

CSE MCQs :: OS MCQs

  1. What is used to protect network from outside internet access ?
  2. A.
    A trusted antivirus
    B.
    24 hours scanning for virus
    C.
    Firewall to separate trusted and untrusted network
    D.
    Deny users access to websites which can potentially cause security leak.

    View Answer

    Workspace

    Discuss Discuss in Forum


  3. What is best practice in firewall domain environment ?
  4. A.
    Create two domain trusted and untrusted domain
    B.
    Create strong policy in firewall to support different types of users
    C.
    Create one Demiliatarized zone
    D.
    Create two DMZ zones with one untrusted domain

    View Answer

    Workspace

    Discuss Discuss in Forum


  5. Which direction access cannot happen using DMZ zone by default ?
  6. A.
    Company computer to DMZ
    B.
    Internet to DMZ
    C.
    Internet to company computer
    D.
    Company computer to internet

    View Answer

    Workspace

    Discuss Discuss in Forum


  7. How do viruses avoid basic pattern matchof antivirus ?
  8. A.
    They are encrypted
    B.
    They act with special permissions
    C.
    They modify themselves
    D.
    None of the mentioned

    View Answer

    Workspace

    Discuss Discuss in Forum


  9. What is known as sandbox ?
  10. A.
    It is a program which can be molded to do desired task.
    B.
    It is program that is controlled or emulated section of OS
    C.
    It is a special mode of antivirus
    D.
    None of the mentioned

    View Answer

    Workspace

    Discuss Discuss in Forum


  11. What is major drawback of anomaly detection IDS ?
  12. A.
    These are very slow at detection
    B.
    It generates many false alarms
    C.
    It doesnt detect novel attacks
    D.
    None of these

    View Answer

    Workspace

    Discuss Discuss in Forum


  13. What is preferred way of encryption ?
  14. A.
    pre shared secret key
    B.
    Using key distribution center (KDC)
    C.
    public key-encryption
    D.
    symmetric key

    View Answer

    Workspace

    Discuss Discuss in Forum


  15. What is not a role of encryption ?
  16. A.
    It is used to protect data from unauthorized access during transmission
    B.
    It is used to ensure user authentication
    C.
    It is used to ensure data integrity
    D.
    It is used to ensure data corruption doesn't happens

    View Answer

    Workspace

    Discuss Discuss in Forum


  17. What is cipher-block chaining ?
  18. A.
    Data is logically 'ANDed' with previous block
    B.
    Data is logically 'ORed' with previous block
    C.
    Data is logically 'XORed' with previous block
    D.
    none of the mentioned

    View Answer

    Workspace

    Discuss Discuss in Forum


  19. What is not an encryption standard ?
  20. A.
    AES
    B.
    TES
    C.
    Triple DES
    D.
    DES

    View Answer

    Workspace

    Discuss Discuss in Forum